Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability

https://lemmy.ml/post/13086274

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability - Lemmy

Doesn’t having admin privileges mean you can load any driver into the kernel anyway, including blatantly malicious drivers?
I’m not sure that’s necessarily true with enforcement of driver signing.
Why’s that? I thought admin could override that
It is part of the SSSCA / CBDTPA / "Trusted" computing initiative. The large corporations want to control what you are allowed to do with your computer. This is where the phrase "digital rights management" comes from.