Excuse me, but Scatman John would like a word with you, from 1994 to be exact.
ramble81
I really wonder how much large scale energy production we’d need if every building was required to have solar. I know we’d need some energy storage tech such as batteries but I’m focusing more on the generation part.
I didn’t say it was, nor did I say UEFI was the problem. My point was additional applications or extensions at the UEFI layer increase the attack footprint of a system. Just like vPro, you’re giving hackers a method that can compromise a system below the OS. And add that in to laptops and computers that get plugged in random places before VPNs and other security software is loaded and you have a nice recipe for hidden spyware and such.
You’d have to have something even lower level like a OOB KVM on every workstation which would be stupid expensive for the ROI, or something at the UEFI layer that could potentially introduce more security holes.
I first dealt with them at least 10+ years ago and at the time they had no ability to do staged roll outs or targeted roll outs. We got updates when they said we did, no choice or control. We had to resort to updating our firewall to restrict the download endpoint and only open it in groups to do a phased update.
Incidentally CrowdStrike has a Linux agent and my previous company was pushing us to install it to check another box on their Cyberliability insurance form. So this could just as easy happen there too.
More like CrashStrike
We had a bad CrowdStrike update years ago where their network scanning portion couldn’t handle a load of DNS queries on start up. When asked how we could switch to manual updates we were told that wasn’t possible. So we had to black hole the update endpoint via our firewall, which luckily was separate from their telemetry endpoint. When we were ready to update, we’d have FW rules allowing groups to update in batches. They since changed that but a lot of companies just hand control over to them. They have both a file system and network shim so it can basically intercept **everything **
Embrace, Extend, Extinguish
profiling the Bluetooth devices in my house
Uh, I hope you’re banning anyone with an iPhone from even getting within 10 meters of your house. Because their phone could easily just grab a list of all BT MACs (or hell, even WiFi MACs) it finds and then transmits that with its current GPS coordinates via its cell network. Doesn’t even need your network at all. And your wireless devices have to transmit their MAC addresses to work even if their not in pairing mode.
You just sound stuck up when you say that. Like “is windows still a thing? I didn’t know because I use Linux. Don’t you?”
Of course Google is still a thing, by far it’s still the largest search engine in use on the planet, so most people won’t notice it. If anything, this hurts all the not-Google users. Can you imagine if different sites started signing exclusivity deals with different search engines?