I hate that today was yet another day Linux people showed their whole ass.

Windows folks are super heroes today. The fact that I, as a database admin specializing in open source systems, was not dragged into today’s events, is amazing.

Don’t knock these people. They win today. Surviving today is a win.

#Crowdstrike

@bedast My problem is that these people refuse to take the correct consequences and migrate away from garbage:

  • You just don't install such garbage on #Unix-esque Systems like #Linux!

  • #CrowdStrike is just yet another #Scareware #Scam.

  • The entire business model of #AntiVirus and other Scareware shouldn't exist to begin with.

  • 3rd party #BinaryBlobs on a non-#FLOSS'd kernel are just bad!

  • It should be #Microsoft's sole tesponsibility to just not allow #Rootkits / #Bootkits like that to exist eith their blessing aka. #Signature on.

  • #Windows & #WindowsServer are unbelieveably #cursed and unmaintainable mess that'll make even #Solaris 7 look clean and sleek.

  • The diversity of Linux and Unix-esque distros like #BSD's make it basically impossible to bmhave such a giant and direct effect.

  • The whole issue should've been avoided throug extensive testing because it's certainly so rampant that it would've been picked up by #QA testers.

  • The fuckedup-ness of #CensorBoot aka. "#SecureBoot" (which is insecure af - see #GoldenKeyBoot!) is the reason why this results in such catastrophic failures, whereas on #Linux one just uses #LUKS and can easily recover files.

  • Most Windows users & -#sysadmins neglect #Backups of Windows machines because there is no good way to backup them!

  • 3rd party kernel binaryblobs are #malware, regardless if "Anti-Malware" or "#AntiCheat" is the claimed functionality.

  • If I don't trust #WindowsDefender then I don't trust Windows or rather Microsoft and thus have to cease using it!

  • This shit would not have been possible under Linux!

  • Matthew Garrett (@[email protected])

    "Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him

    Nondeterministic Computer

    @kkarhan Congratulations are showing your whole ass.

    #ReplyGuy

    @bedast Go thell that yourself often enough and you may start believing that shit.

    #InconvenientTruth is inconvenient - if you dislike sweat and heat then don't work as a [digital] firefighter ffs!

    #thxbye #EOD