• db2@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 months ago

      Clearly you didn’t do any machine recovery during that fiasco or you wouldn’t ask. When the machines crashed the only fix was to get in and delete the offending file, but as Windows wouldn’t load up you had to unlock the drive to get in with a working OS.

      • stephen01king@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 months ago

        Ok, but what lesson was Microsoft supposed to learn from the Crowdstrike fiasco that have to do with the implementation of Bitlocker in personal devices?

        Are you suggesting that OS drive encryption should never be implemented due to the fact that computers might sometimes need to be accessed without the OS booting up? That doesn’t really make sense. That’s what Bitlocker keys are for, to unlock the drive if needed.

        • db2@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          5 months ago

          OK buddy, you can be right if it’s that important to you.

          • stephen01king@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 months ago

            I don’t know everything about what happened during the Crowdstrike fiasco since it didn’t directly affect my company, so I’m asking questions. I don’t really care about being right. If you were talking about something I don’t know, I’m glad to learn new things about that incident. Why get defensive on something like this instead of just clarifying your point?

            • db2@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 months ago

              OK, I may have misread the intent. Sorry.

              Basically for any machine with bitlocker on it we had to unlock the drive before getting the ability to load an external OS to go on to that drive and remove the problem file. The built in Windows was completely borked. For a home user that’s generally quick and easy to do, in any corporate environment it will take hours if not days to get that unlock code and meanwhile nothing can get done meaning business grinds to a halt and waits.

              As for what happened in the first place, Crowdstrike updated a file for their nanny app which has kernel (lowest OS level) access so when their app choked on the bad update it crashed the kernel which meant Windows couldn’t even load much less run.

              The two aren’t directly related but one made the other significantly harder to fix with any speed.