Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro Newsgroups: comp.os.vms Subject: Re: A meditation on the Antithesis of the VMS Ethos Date: Tue, 23 Jul 2024 00:13:46 -0000 (UTC) Organization: A noiseless patient Spider Lines: 15 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Tue, 23 Jul 2024 02:13:47 +0200 (CEST) Injection-Info: dont-email.me; posting-host="e8b75ad8e7aaf8b1a754381faa416e2b"; logging-data="931986"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18WYQd74xep3G3PC8By0bxm" User-Agent: Pan/0.158 (Avdiivka; ) Cancel-Lock: sha1:KxATcn9VHaxF04SlcR63ny1Evr0= Bytes: 1898 On Mon, 22 Jul 2024 18:24:14 +1000, Gary R. Schmidt wrote: > https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/ “No one noticed” ... perhaps because hardly anybody is using these sorts of intrusive EDR products on Linux? Another thing that reduces the chance of screwups: a poster in another group gave this link to a comment by long-time Linux contributor Matthew Garrett: on Windows, CrowdStrike has to load its own proprietary kernel driver to do its anti-malware checks, but on Linux they just rely on the standard configurable EBPF facility. This helps to reduce the chance of things going wrong.