Skip Navigation
Microsoft looking to restrict kernel level access after CrowdStrike incident might help us with our current Anti-Cheat dilemma
  • @dueuwuje @mudle

    If I understand it correctly, it already has been (at least formally) reviewed by microsoft before signing and allowing that signed code run kernel-mode. But the crowdstrike's driver module was not just running malware scanner on itself, it was interpreting what is basically unsigned code that was easier and faster to update. This unsigned files were the ones containing faulty update.

    At least that what I understand from https://www.youtube.com/watch?v=wAzEJxOo1ts , it may not be entirely correct or I may have misunderstood.

    But if it is true, it may be more sensible to make an API so software with specific permissions could access information needed to effectively function as antivirus, without being run in kernel mode.

  • untsuki Tired Bunny :bunhdcomfysleep: @udongein.xyz

    Sleepiest certified shitcoder :verified:

    Warnings: Account can contain small amounts of NSFW content.

    \--- Contacts + full description --- EN https://tired-bun.neocities.org/ RU https://tired-bun.neocities.org/ru/

    Posts 0
    Comments 1