AV vendors have worried that this could advantage Microsoft's security software.
See full article...
See full article...
This is what I want.Interesting. The CrowdStrike failure also shows how badly most companies do change control.
I'd like to see Microsoft kick the DRM/Anticheat companies out of the Windows kernel as well.
I agree fully with this. On an added note, there's no reason to think MS won't accidentally compromise their own anti-virus software through some mistaken update. MS has published bad updates before after all, so if they make an exception for their own software, it's rendering the entire point of such a restriction moot.The obvious answer to accusations of anti-competitive self-dealing would be for Microsoft to eat its own API dogfood here. Windows Defender should be the guinea pig for the new endpoint security API. If it's not good enough for Defender, it shouldn't be forced on third party products. If Defender can do its job from userspace using only the new API, then the API is ready.
The BSOD is usually only visible long enough for the system to dump memory before it reboots, so you'd have to be looking right at it when it happens to catch it anyways.Dunno about the new BSoD (hey, same acronym!). Possibly thanks to decades of conditioning, that blue screen gets my attention immediately, but a black screen with text is normal everyday viewing, and I fear I wouldn't necessarily notice.
I could also see a very valid argument along the lines of "We, as the developers and maintainers of Windows, have the right to fix our product's security problems at a deeper level than third parties will be allowed to." Although, this argument relies on Windows Defender being a part of Windows rather than it's own sold-separately-product.The obvious answer to accusations of anti-competitive self-dealing would be for Microsoft to eat its own API dogfood here. Windows Defender should be the guinea pig for the new endpoint security API. If it's not good enough for Defender, it shouldn't be forced on third party products. If Defender can do its job from userspace using only the new API, then the API is ready.
And nearly a year later it seems somehow Crowdstrike has received very little in repercussions for the most damaging outage in recent memory, while spending more than ever in federal lobbying.Interesting. The CrowdStrike failure also shows how badly most companies do change control.
I'd like to see Microsoft kick the DRM/Anticheat companies out of the Windows kernel as well.
On the one hand, this is good. On the other, the attack surface has just grown again.QMR will allow Microsoft to "broadly deploy targeted remediations to affected devices via Windows RE...."
Philosophically, I agree. Allowing kernel access seems to be the basis for so many OTHER problems, it should be locked down tight by the kernel makers. PRESUMABLY, they're not going to fuck it up with updates (yes, mocking laughter is permitted, because it's Microsoft, so we all know they're going to fuck it up with updates).This is what I want.
Apple did this a while back and while I complained about shitty firewalls and anti malware for a while, macOS is absolutely solid because Apple kicked everyone out to user space, so now it’s their own fault if they mess up the kernel.
Or it could be option C: Announcing something with fanfare, doing minor tweaks and pretending the problem is fixed, but largely proceeding with the status quo, relying on pinkie swearing that the vendor's software doesn't access the kernel. Something like a license agreement tweak that will be just as carefully read by the vendors as TOS's are by the users...It's not clear whether this announcement is a first step toward booting third-party security companies out of the Windows kernel entirely or if it's simply a new, more foolproof option for companies whose software doesn't need that level of access.
Are you blaming the customers? Because Crowdstrike offered zero control over their equivalent of DAT updates, there was no delay available, no rollback, no release mechanism. You had all of that over engine updates, and we took advantage of them, but the definition updates come down multiple times a day. The problem here is that they updated what most would consider the engine with a definition update and apparently pushed it out without deploying it even to an internal lab let alone pilot collections.Interesting. The CrowdStrike failure also shows how badly most companies do change control.
I'd like to see Microsoft kick the DRM/Anticheat companies out of the Windows kernel as well.
I mean, maybe.QMR = new attack vector + more surface area for attacks.
So now you can get Windows to boot into an insecure but stripped down environment, likely without user controls, automagically! Nice.
That's been a configurable setting.The BSOD is usually only visible long enough for the system to dump memory before it reboots, so you'd have to be looking right at it when it happens to catch it anyways.
But still won't be informative to a human or search engine who just wants to know what broke and how to fix it.The unexpected restart screen has been "simplified" in a way that "improves readability and aligns better with Windows 11 design principles, while preserving the technical information on the screen for when it is needed."
I agree that kernel level checks need to GTFO, but I'm not convinced that whatever solution they'll replace them with won't break under Linux either.Please please please kill off the kernel level anti-cheat software as well! This is like the only thing holding back linux gaming and if microsoft removes this "feature" suddenly all these game companies have to figure out a solution that would theoretically work on linux as well.
Yeah, I was pretty confused when the CrowdStrike outage happened and I learned about the existence of this product, it seems like a complete paradox to pretend to be secure because you're giving a single company full kernel level access to all your systems...zero trust should also mean the security vendors too.
not sure why we keeping giving them root access to everything
Should that be Windows 11 25H2?The QMR functionality and the black version of the blue screen of death will both be added to Windows 11 24H2 later this summer.
Surely you jest. This reads like one of those "hilarious" imaginary dialogues you often find in online comment sections, which look like this:Andrew Cunningham said:For starters, the screen will now be black instead of blue, a change that Microsoft briefly attempted to make in the early days of Windows 11 but subsequently rolled back.
Goodness.Andrew Cunningham said:The unexpected restart screen has been "simplified" in a way that "improves readability and aligns better with Windows 11 design principles, while preserving the technical information on the screen for when it is needed."
Based on the description, it appears QMR has the ability to let Microsoft push updates to the OS partition. Possibly this requires Administrator password and Bitlocker key, but since they're rolling it out to Home by default and opt-in for other tiers, it sounds like they've got some mechanism to push signed updates from Microsoft without requiring too much hands-on-keyboard expertise. This introduces new opportunities for impersonation attacks and flaws in whatever they added to enable load and execution of the update packages.I mean, maybe.
There's already the recovery console, which can't actually provide access to files unless you have a bitlocker key (if applicable) and an administrator password.
In this day and age, why don't they stick a QR code on the screen too? Then someone can easily capture it and submit it directly to MS from their phone to retrieve more detailed technical information.Goodness.
How could anyone possibly improve the readability of a BSoD while preserving ALL OF THAT technical information?
View attachment 112548
It's my understanding the modern BSOD has one.In this day and age, why don't they stick a QR code on the screen too? Then someone can easily capture it and submit it directly to MS from their phone to retrieve more detailed technical information.
Well no shit! But they have themselves to blame.AV vendors have worried that this could advantage Microsoft's security software.
I took their comment to mean that ClownStrike - oops, I mean crowd strike - has terrible change control.Are you blaming the customers? Because Crowdstrike offered zero control over their equivalent of DAT updates, there was no delay available, no rollback, no release mechanism. You had all of that over engine updates, and we took advantage of them, but the definition updates come down multiple times a day. The problem here is that they updated what most would consider the engine with a definition update and apparently pushed it out without deploying it even to an internal lab let alone pilot collections.
It is a consequence of Windows application security model, which assumes by default that software is trustworthy and then tries to detect bad behavior after the fact. If you're a large organization that needs to protect your systems and data you end up needing something like Crowdstrike to detect compromised software or you're going to get destroyed by ransomware, bitcoin miners, IP theft and the like. It would be better if MS would improve what is built into Windows itself (sandbox apps, more protective permission model, less allowing software to install by requesting admin permissions, etc), but until that happens this is the least terrible option.Yeah, I was pretty confused when the CrowdStrike outage happened and I learned about the existence of this product, it seems like a complete paradox to pretend to be secure because you're giving a single company full kernel level access to all your systems...
Like am I just crazy or does this not make any goddamn sense at all?
Stop giving more money to this grift already...
I'm a newb to Linux gaming, but have spent a very happy couple of months not booting Windows on my personal computers. Valve has really made it easy to get your Windows games running through Steam and some shops are releasing Linux-native premium games. Epic and other industry players are really starting to notice and making Anti-cheat much more approachable than it had been. (I cannot personally verify that, yet). Mildly better framerates and generally smoother all-around performance on an OS that isn't rampantly spying on you or popping up ads everywhere.Please please please kill off the kernel level anti-cheat software as well! This is like the only thing holding back linux gaming and if microsoft removes this "feature" suddenly all these game companies have to figure out a solution that would theoretically work on linux as well.
The obvious answer to accusations of anti-competitive self-dealing would be for Microsoft to eat its own API dogfood here. Windows Defender should be the guinea pig for the new endpoint security API. If it's not good enough for Defender, it shouldn't be forced on third party products. If Defender can do its job from userspace using only the new API, then the API is ready.