this post was submitted on 03 Aug 2024
65 points (92.2% liked)

Canada

7187 readers
399 users here now

What's going on Canada?



Communities


🍁 Meta


πŸ—ΊοΈ Provinces / Territories


πŸ™οΈ Cities / Local Communities


πŸ’ SportsHockey

Football (NFL)

  • List of All Teams: unknown

Football (CFL)

  • List of All Teams: unknown

Baseball

Basketball

Soccer


πŸ’» Universities


πŸ’΅ Finance / Shopping


πŸ—£οΈ Politics


🍁 Social and Culture


Rules

Reminder that the rules for lemmy.ca also apply here. See the sidebar on the homepage:

https://lemmy.ca


founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] TheBat@lemmy.world 2 points 3 months ago (3 children)

And if Crowdstrike had competent management who valued a proper QA department, the overall failure wouldn't have happened at all.

This has nothing to do with OS. This is a result of corporate fuckery.

[–] lemmyng@lemmy.ca 3 points 3 months ago (1 children)

It has a little bit to do with the OS. Windows does not have the same sandboxing capability for modules that Linux provides. The fact that the sensor needs to run in ring 0 is a problem, and eBPF at least mitigates much of the issue in Linux. But I think you meant that CrowdStrike is by no means blameless, and I agree - they have a long history of shitty implementations, and rightly deserve to be the focus of our anger.

[–] cyberpunk007@lemmy.ca 1 points 3 months ago

I know it has nothing to do with macos. I agree it's the QA piece. I heard upper managements theme was "two feet on the gas". Also the CEO was the CTO of McAfee when they had a similar issue back in 2010 if I'm not mistaken. πŸ™ƒ

[–] nyan@lemmy.cafe 1 points 3 months ago

Hopefully there are a bunch of programmers there right now standing in a circle around the desk of some manager and bombarding them with a continuous chant of "We told you so!" We knew in the 1990s not to trust stuff coming in off the Internet to be what it claims or reach its destination unmangled, and as I understand it, the software was blindly attempting to parse unverified threat definition files it had downloaded. Doing it all in ring 0 was just that extra crowning touch. This should have been caught before it even got to QA.