TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Microsoft blames EU rules for allowing biggest IT outage to happen

21 点作者 riv99110 个月前

11 条评论

janice199910 个月前
Is anyone really gullible enough to blame the EU for CrowdStrike rolling out a faulty update? What is Microsoft PR thinking? I also find it amusing that George Kurtz (CrowdStrike CEO) was perfectly capable of causing a global IT disaster in 2010 as McAfee CTO without kernel access (the update just deleted critical Windows XP system files).
fabian2k10 个月前
I don't find that particularly credible. If Microsoft would boot all security products (including their own) out of the kernel and force them to use specific interfaces for this there is no anti-trust concern at all there. It would only be a problem if they wanted Windows Defender to remain having privileged access while taking it away from everyone else.
nullfrigid10 个月前
Microsoft has a very solid point here. MS has wanted to kick AV vendors out of kernel space for a long time because it isn&#x27;t necessary, and can lead to the type of incident we are talking about here.<p>MS provides a userspace interface[0] for AV vendors to do what they need to do, but they can&#x27;t be forced to use it.<p>So yes, due to EU regulations, AV vendors can still play in kernel space, and can bring much of the world to a halt when they make a mistake as a result.<p>[0] <a href="https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;windows&#x2F;win32&#x2F;amsi&#x2F;antimalware-scan-interface-portal" rel="nofollow">https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;windows&#x2F;win32&#x2F;amsi&#x2F;antimal...</a>
评论 #41035446 未加载
评论 #41034556 未加载
评论 #41035676 未加载
评论 #41036587 未加载
评论 #41035088 未加载
vfclists10 个月前
The true reason is a regulatory environment where snake-oil peddling corporations lobby for governments to mandate the use of their crapware in the name of security and reliability.<p>This causes senior management to push for the installation of this crapware&#x2F;malware on their systems, overriding the objection of their system administrators who know better.<p>Senior management want to cover their asses, and the administrators shrug their shoulders and respond &quot;if you say so&quot;.<p>In sum it is mostly a regulatory racket that is profitable for the peddlers of this crapware and for management who can claim that they did what they were required to do to stop shit from happening. Everybody wins except shareholders, customers and IT staff who have to fix this mess without getting the righteously justified overtime and bonuses.<p>Why do you think insurance companies have backing out of the business of insuring against these kind of disasters? They&#x27;ve clearly learned better.<p>Why do you think I stopped using Norton, MacAfee, etc, etc, and etc and opted for just decent backups and Windows own built-in stuff?
评论 #41035365 未加载
评论 #41034405 未加载
hilbert4210 个月前
Oh yeah, if Microsoft was so worried about other companies tinkering with its kernel then why didn&#x27;t it introduce routines that would ensure that a reboot would actually occur on a boot load error? (Upon error, a reload would then omit the faulty code as well as tell users there was a problem with the update.)<p>I&#x27;d suggest that there is no reason a BSOD—Blue Screen of Death—should ever occur on a system that was already working as the OS should be constructed in such a way that it can undo a faulty patch. As you&#x27;d know, there is already such a thing as Volume Shadow Copy, VSS, in MS Windows. Microsoft could have adopted this and similar techniques to ensure that the system either stayed up or rebooted.<p>Yes, I can hear Microsoft&#x27;s retort now that doing that would make Windows more vulnerable to viruses, infiltration, etc.<p>To that I&#x27;d say utter bullshit, the real problem—as it has always been with Microsoft—is that it doesn&#x27;t properly finish or bootstrap its code against errors before it releases it to the public. Microsoft is thus doing cheapskate engineering as it&#x27;s much more profitable.<p>Hopefully, eventually regulators will require hardening of such software together with guarantees against such faults—guarantees that if not honored would result in enforceable financial penalties.<p>Only loss of income&#x2F;profit is likely to fix this problem.<p>EU, for everyone&#x27;s sake quickly debunk that deliberately misleading PR crap from Microsoft before it takes hold.
_heimdall10 个月前
That&#x27;s cute, but I don&#x27;t know of any EU rule that requires a Windows to give the blue screen of death when a third party kernel module fails.
评论 #41035421 未加载
bnchrch10 个月前
non-paywall: <a href="https:&#x2F;&#x2F;archive.ph&#x2F;20240722121551&#x2F;https:&#x2F;&#x2F;www.telegraph.co.uk&#x2F;business&#x2F;2024&#x2F;07&#x2F;22&#x2F;microsoft-blames-eu-rules-worlds-biggest-tech-outage&#x2F;" rel="nofollow">https:&#x2F;&#x2F;archive.ph&#x2F;20240722121551&#x2F;https:&#x2F;&#x2F;www.telegraph.co.u...</a>
josefritzishere10 个月前
I&#x27;m sure Microsoft would prefer to be less regulated, but I dont see how that would have changed the outcome here.
评论 #41034952 未加载
mwhitfield10 个月前
The headline, as always, is disingenuous. They were asked why they couldn&#x27;t lock third parties out of this level of unprotected system access, and said that the 2009 ruling prevented them from doing so. Which is simply factually correct.
评论 #41036385 未加载
dijit10 个月前
Yeah, of course they would.<p>&quot;Just regulate us less, seriously!&quot;.<p>Their solution to this situation is quite literally monopoly, which is hilarious.
anotherhue10 个月前
Never waste a crisis.