CrowdStrike Avoids Responsibility

preview_player
Показать описание
Recorded live on twitch, GET IN

### Article

### My Stream

### Best Way To Support Me
Become a backend engineer. Its my favorite site

This is also the best way to support me is to support yourself becoming a better backend engineer.

MY MAIN YT CHANNEL: Has well edited engineering videos

Discord

Рекомендации по теме
Комментарии
Автор

"It wasn't our kernel driver. Just something our kernel driver dereferences, isn't signed, doesn't validate its value and fails critically when an unexpected value appears."

DUDA-__-
Автор

homies didn't get the memo that "move fast and break things" doesn't mean to break entire airlines and hospitals and stock markets

moonasha
Автор

To be fair to CrowdStrike, if the system is stuck in a continuous boot loop it can't be infected with viruses and the data is protected. So mission achieved I guess

tordjarv
Автор

Crowdstrike learned from Boeing: Say that you own it, then proceed to blame others

Daniel-irki
Автор

Typical behavior nowadays: deny everything, never take accountability for anything.

Antody
Автор

The CEO of Crowdstrike was also CTO of McAfee back in 2010 during its global crash. Let that sink in.

RubixCubed
Автор

It was just a beautiful blue screen of serene life.

Mosotti
Автор

The problem nowadays is that CEOs or other high ups don't face any repercussions when they have clearly failed at their job. What should be high risk high reward jobs, have turned into a 0 risk, insane reward jobs. Whenever they fail, they either stay in their position, or step down, receive a ton of severance money, and simply go work at the next company who for some reason will gladly hire them.
Meanwhile the poor engineer who rushed this code out will A) feel absolutely terrible (even though it's clearly a process failure), and B) likely get fired or at least get cooked by management for as long as he works there.

wouterzonneveld
Автор

They could have just said "we tested in production on friday"

oussama
Автор

I worked for crowdstrike for around a year, and had to quit. Worst job I ever had, they pulled this shit all the time, and internally, they point fingers instead of looking for solutions. I remember a director calling out someone by name and berating them in front of like 50 people and NO ONE DID ANYTHING, I reported him and sent in a audio recording and nothing happened. Additionally, this screams like a manager was told by executives they needed to get this update out to look good on some arbitrary metric. They will and do threaten jobs if you don't just do what they want. I remember putting in some process improvement presentations together and I was told if I didn't stop pursuing it I would get written up. Worst experience I've ever had at a job, hands down. I literally cried every morning before signing on. I would take working a dead end job, getting paid min. wage than going back to a company like them.

prettybad
Автор

You can almost feel the lawyers standing over their shoulders making sure they don't say anything that could be used in one of the many court cases that just have to come from an error this massive.

rockdemn
Автор

Unironic "I'm sorry you feel this way" response.

AlbatrossCommando
Автор

When I was a child, many years ago, the common word for the kind of corporate word salad in that press release was "gobbledygook". I note that they carefully avoided revealing any of the following:
1. What, exactly, caused the crashes.
2. Who, exactly, sent the faulty file to 8M customers.
3. What, exactly, do they intend to do to prevent recurrence.
There should be a law against releasing this kind of gobbledygook, with a mandatory fine of $5000 per instance.

Hatley-Software
Автор

Imagine every Normie in the world knows about your company for crashing the internet and your response is "there is a chance that solar radiation has hit the exact bit in our application on each machine in the word"

MrVecheater
Автор

If they publicly accept responsibility they effectively admit fault and can be sued by 15 different industries.
Although they will probably still be sued into oblivion (and hopefully they will).

AlexanderEndless
Автор

Their kernel driver loads unsigned files, validates nothing, interprets some part of that file as a pointer (null in this case) and dereferences it. Imagine for a moment that this file wasn't all zeros, but crafted by malware. This is a security company. Their product makes you *more* vulnerable.

stribika
Автор

8:53 b4shful: "sir, a second channel file has hit production" lmao. This killed me

DingusKhan.
Автор

"the issue is not the result of a cyberattack". I disagree, crowstrike IS the cyber attack. You gotta be crazy to install a closed source kernel level driver that gets auto updated into critical infrastructure.

turtlefrog
Автор

The CEO was also a cofounder. He hired the team of management below him. I blame the CEO.

JeffreyRennie
Автор

Imagine being the engineer pushing a change on Friday evening, then getting stuck in public transport because the train has just been upgraded to Windows ME and has been taken out by your fix just like half the rest of the universe.

Move fast, break everything.

black-snow