CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

  • Todd Bonzalez@lemm.ee
    link
    fedilink
    arrow-up
    41
    ·
    5 months ago

    They’re going to implement something like eBPF for the Windows kernel. This will allow kernel-level modules to run with zero risk of crashing the kernel. If the module fails, it fails without taking down the kernel with it.

    Linux already has this. It works great. If Windows gets this, all antivirus and anti-cheat software is going to have to transition.

    Once that happens, it will be way easier to add anti-cheat software to Linux that operates the same as on Windows. It may be possible to load and unload it only when playing and actually having competition-grade gaming on Linux.

    Of course, this is a security disaster that I wouldn’t allow on any of my daily drivers, but I would enjoy playing Destiny on my Steamdeck if there’s a legit way for me to do it.

    • baseless_discourse@mander.xyz
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      5 months ago

      According to wikipedia, both Windows and linux have it, and both are open source.

      Believe it or not, a lot of companies, no matter how cool and secure their marketing sounds, are just seriously incompetent.