Ah yes, let's ship a kernel driver that parses update files that are pushed globally simultaneously to millions of users without progressive staging, and let's write it in a memory unsafe language so it crashes if an update is malformed, and let's have no automated boot recovery mechanism to disable things after a few failed boots. What could possibly go wrong?
🤦♂️
@marcan brb. Need to add a few topics in my personal Jira.
@marcan Well it's a nice stunt. I mean nobody would ever use "endpoint security" software on an important system. That would be ridiculous and a clear breach of, for example, the contract rules of Crowdstrike.
@marcan rust in kernel wasn't available when this thing was written. And you just don't go rewrite stuff for the fun of it.
Not to defend them for whatever errors happened in the qa proces, but hindsight 20/20 here.