CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.
Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.
@Wahots @mudle , I hold that same relative feeling, but people do own their computers and if they want to play League of Legends and let someone into the kernel, who am I to tell them no? I ran league in Lutris, so no chance of making that decision even if I wanted to.
Problem is, that similarly to invasion of privacy, this is not visible, and so they don’t understand what’s happening. It’s just one more program, what could happen? It’s not like somebody coming and inspecting your house, in that it is not noticeable in practice.
@ReversalHatchery , I completely agree. My ring 0 is sacred and I can’t prove there isn’t anything in it already, but I wouldn’t knowingly shove third party stuff into my kernel. I like to keep my apps restricted from anything they don’t need on my system in userland. However, millions upon millions of people installed Tencent’s Vanguard to play League of Legends like it wasn’t any big deal (it is). If people want an inner ring security module, I suppose that’s a bit their choice. 🤷🏽♂️
That’s the issue with it being closed source, it makes sense to avoid vulnerabilities by locking off the kernel, frankly I’d class adding anti cheat to your kernel on the same tier as mucking about with a Linux kernel and recompiling it