@theregister that's not enough!
#Microsoft must #ban #Rootkits / #Bootkits and #Lernel-level #drivers entirely or #Windows will get banned amidst it's unfixable security!
@theregister that's not enough!
#Microsoft must #ban #Rootkits / #Bootkits and #Lernel-level #drivers entirely or #Windows will get banned amidst it's unfixable security!
@bedast My problem is that these people refuse to take the correct consequences and migrate away from garbage:
You just don't install such garbage on #Unix-esque Systems like #Linux!
#CrowdStrike is just yet another #Scareware #Scam.
The entire business model of #AntiVirus and other Scareware shouldn't exist to begin with.
3rd party #BinaryBlobs on a non-#FLOSS'd kernel are just bad!
It should be #Microsoft's sole tesponsibility to just not allow #Rootkits / #Bootkits like that to exist eith their blessing aka. #Signature on.
#Windows & #WindowsServer are unbelieveably #cursed and unmaintainable mess that'll make even #Solaris 7 look clean and sleek.
The diversity of Linux and Unix-esque distros like #BSD's make it basically impossible to bmhave such a giant and direct effect.
The whole issue should've been avoided throug extensive testing because it's certainly so rampant that it would've been picked up by #QA testers.
The fuckedup-ness of #CensorBoot aka. "#SecureBoot" (which is insecure af - see #GoldenKeyBoot!) is the reason why this results in such catastrophic failures, whereas on #Linux one just uses #LUKS and can easily recover files.
Most Windows users & -#sysadmins neglect #Backups of Windows machines because there is no good way to backup them!
3rd party kernel binaryblobs are #malware, regardless if "Anti-Malware" or "#AntiCheat" is the claimed functionality.
If I don't trust #WindowsDefender then I don't trust Windows or rather Microsoft and thus have to cease using it!
The #LogoFail #UEFI #exploit is a perfect example of how capitalism fucks everything up. So many people worked so hard on securing UEFI against #bootkits but having a goddamn image load was necessary for capitalist "intellectual property" to be enforced, thus opening this vulnerability for literally every Windows and Linux system with a hardware manufacturer logo loading in boot, which is most of them. https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/
This isn't a security fail, it's a #capitalism fail, because the social/legal regime of #intellectualproperty is actually unnecessary and oppressive, and in this case prevented people from designing secure systems.
Ars Technica: Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack https://arstechnica.com/?p=1988975 #Tech #arstechnica #IT #Technology #unitedextensiblefirmwareinterface #Features #Security #bootkits #firmware #logofail #malware #Biz&IT #uefi
Ars Technica: Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw https://arstechnica.com/?p=1921876 #Tech #arstechnica #IT #Technology #vulnerabilities #Features #bootkits #malware #Windows #Biz&IT #uefi
Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw
https://arstechnica.com/?p=1921876
#vulnerabilities #Features #bootkits #malware #Windows #Biz&IT #uefi