CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

  • CalcProgrammer1@lemmy.ml
    link
    fedilink
    arrow-up
    123
    arrow-down
    1
    ·
    3 months ago

    Please, get this garbage out of the kernel. If it isn’t there to talk to hardware, third party code has no place in the kernel. The same shit that Crowdstrike did could easily happen with any of these useless anticheats.

    • teawrecks@sopuli.xyz
      link
      fedilink
      arrow-up
      40
      ·
      3 months ago

      In b4 msft creates a level between kernel and user level for this stuff to sit at. It will have read-only access to all of kernel memory, and will otherwise function the same, but when it crashes it won’t take the OS down, just certain programs that rely on it.

      What will they call it? “Observer” level? “Big Brother” level? “Overseer” level? Probably just something to do with “Verifying Trust/Integrity”. Google will also want to quietly stick something for “Web Integrity” there.

      • Tokugero@lemmy.world
        link
        fedilink
        arrow-up
        8
        ·
        3 months ago

        https://github.com/microsoft/ebpf-for-windows

        Right now it’s network level, but Linux’s implementation has since moved out from just packet filtering to full syscall filter and interaction; it’s generally accepted that Windows will be following suit with this implementation. Thought you’d like a name to the thing you described

      • JakenVeina@lemm.ee
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        3 months ago

        Is it just me, or does this seem like a reasonable solution? Assuming it’s technically feasible.

        • teawrecks@sopuli.xyz
          link
          fedilink
          arrow-up
          6
          arrow-down
          1
          ·
          3 months ago

          It’s still giving third party software kernel level control over your device, so you’re still giving up any possibility of privacy and probably leaving yourself wide open to a backdoor attack, but that has been normalized. So to the degree that what people accept as reasonable these days is unreasonable, yeah, that’s why I think MSFT will try it.

        • fishpen0@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          3 months ago

          This is exactly how ebpf was implemented for the Linux kernel. You can build watchdog processes that can see what’s happening in the kernel and build kernel interrupts but it’s actually all executed in user space and not rewriting the kernel itself. Since it’s a proper api, it also means it’s incredibly hard to fundamentally break the system, unlike when you’re just blowing away kernel code with your own shit like all these security products do.

    • xinayder@infosec.pub
      link
      fedilink
      arrow-up
      9
      arrow-down
      2
      ·
      3 months ago

      As much as I despise MS and think they are equally incompetent, I don’t think it’s a good idea to lock down Windows. They will stop providing kernel access to 3rd parties at first, then a few months later you will only be able to download software from the Microsoft Store.

      Yes, it’s a security issue but them being allowed to close down their OS sets a dangerous precedent that will make Windows even more shittier and enshittified than it already is.

      • ji17br@lemmy.ml
        link
        fedilink
        arrow-up
        12
        arrow-down
        2
        ·
        3 months ago

        There is zero chance of that happening. This is exactly what people said when Apple created a Mac App Store. Surprise surprise you can still run any software you want on a Mac.

      • EpeeGnome@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 months ago

        They’d be seriously shooting themselves in the foot if they did that. Most corporations have 3rd party software that they would not be able or willing to give up, software development for Windows would be unable to test and debug, and I know from personal experience that many consumers find the already existing S Mode to be frustrating and confusing.

        • xinayder@infosec.pub
          link
          fedilink
          arrow-up
          1
          ·
          3 months ago

          They kinda already do this. Any .exe you download outside the Microsoft Store requires double confirmation before you can execute it, unless it’s from Microsoft.

      • Phoenixz@lemmy.ca
        link
        fedilink
        arrow-up
        2
        arrow-down
        2
        ·
        3 months ago

        Good. Let them. Fuck Microsoft and literally ALL the crap they’ve produced. After having to deal with their shit for over 30 years I can’t wait for them to finally sink their own boat