[HN Gopher] CrowdStrike accepting the PwnieAwards for "most epic...
       ___________________________________________________________________
        
       CrowdStrike accepting the PwnieAwards for "most epic fail" at
       defcon
        
       Author : teddyh
       Score  : 324 points
       Date   : 2024-08-11 15:52 UTC (7 hours ago)
        
 (HTM) web link (twitter.com)
 (TXT) w3m dump (twitter.com)
        
       | dredmorbius wrote:
       | Via xcancel:
       | <https://xcancel.com/singe/status/1822324795645575263>
        
       | candiddevmike wrote:
       | Wonder what kind of deliberation led to them accepting the award.
        
         | cdchn wrote:
         | "No such thing as bad press" I assume.
        
         | AnimalMuppet wrote:
         | They screwed up. They know it, and everybody else knows it.
         | Trying to pretend they didn't would just make them look even
         | more lame.
         | 
         | Or, viewed from the other side: Owning your failures makes you
         | a grownup.
        
           | H8crilA wrote:
           | Shhh, the people here want blood.
           | 
           | BTW, did you know that there's an endless stream of
           | "satisfying" drama on YouTube? I heard that Mr. Beast is
           | finally in some hot water!
        
             | Biganon wrote:
             | The outage caused actual human deaths. Yeah, most people
             | here probably think the priority is criminal justice, which
             | you might call "blood" in a dishonest attempt to make _us_
             | appear cynical when they 're the ones accepting funny nerdy
             | awards after causing so much chaos.
             | 
             | Maybe next time a doctor causes death because of their
             | negligence, they should accept an "oopsie award"? It would
             | be le funny lulz XD
        
         | bugbuddy wrote:
         | Hubris: the belief that they are special and will get away
         | scot-free for all damages they caused.
        
           | SquareWheel wrote:
           | Did you click through to the video? Because the acceptance
           | speech seemed to show the opposite of hubris to me.
           | Specifically in owning up to the mistake, and using the award
           | as a reminder to do better in the future.
        
             | financetechbro wrote:
             | I'm sure he does not represent the PR and legal teams at
             | CrowdStrike. I'd take anything he says with a grain of salt
        
               | candiddevmike wrote:
               | CrowdStrike is publicly traded and he's accepting the
               | award as president of the company. You bet your ass he
               | does represent the PR and legal teams here.
        
         | tgsovlerkhgsel wrote:
         | Refusing to show up generates the same, if not more, negative
         | PR without the opportunity to show humility and promise to do
         | better.
        
         | nonrandomstring wrote:
         | Comes a point when some people just have an "ethical breakdown
         | (breakthrough)". It's a positive thing. It's where recovery
         | starts. He's owning it. There's no absolution until you throw
         | yourself in front of the lions. At this point who cares what
         | the PR and legal teams have to say. They'll be lucky to have a
         | job in a few months.
         | 
         | I really hope he makes the most of a great opportunity to tell
         | some truth, so that we can break the cycle of bullshit
         | solutions causing further pain and loss in the future:
         | Something like;                  "Thanks for the award. Well,
         | we all knew this managed endpoint        cybersecurity shit was
         | never gonna fly. And on Windows? Seriously?!        You all
         | knew it too, but you pays yer money and takes yer chance
         | for a lucky charm to keep the auditors and insurance ghouls
         | away. So here we are. We all got caught with our pants round
         | our        ankles. It was a good racket while it lasted. Oh
         | well... Anyone        hiring?"
        
         | motohagiography wrote:
         | something along the lines of, how do you reach your most
         | influential customers all at once with a sincere message. this
         | was the right thing to do.
         | 
         | anyone who makes serious decisions will see acknowledging this
         | in front of peers was correct. it's funny how the hacker ethic
         | of celebrating failures as lessons becomes impossible when you
         | have a chorus angling for leverage all the time. the failure
         | mode of most tech is catastrophic, where all the convenience
         | you get from it disappears suddenly and randomly. I'd be mad
         | about the lost time during the recovery and over missed flights
         | or even health services, but managing that risk is the job.
         | 
         | to anyone else, next time something fails and messes up your
         | plans or puts you in a spot, try to remember a time when you
         | had a chance to do something well but didn't because you were
         | thinking, "not my problem."
        
         | xyst wrote:
         | Probably firm they outsourced their public relations to thought
         | this would be a good idea. It's backfired
        
       | chongli wrote:
       | I appreciate that we're finding the humour in this catastrophe
       | but what about the question of liability? I have seen a few
       | stories on HN of the billions lost by this event but so far not
       | much in the way of lawsuits.
       | 
       | What is the situation? Are the licenses so ironclad that
       | customers have no recourse? I could understand this in the case
       | of consumers who might suffer minor inconvenience as their home
       | PC is out of service for a few hours/days but it seems totally
       | unacceptable for industries to accept this level of risk
       | exposure.
       | 
       | This is one of the big reasons civil engineering is considered
       | such a serious discipline. If a bridge collapses, there's not
       | only financial liability but the potential for criminal liability
       | as well. Civil engineering students have it drilled into their
       | heads that if they behave unethically or otherwise take
       | unacceptable risks as an engineer they face jail time for it. Is
       | there any path for software engineers to reach this level of
       | accountability and norms of good practice?
        
         | gjsman-1000 wrote:
         | > Is there any path for software engineers to reach this level
         | of accountability and norms of good practice?
         | 
         | Heck, no.
         | 
         | Civil engineering doesn't change. Gravity is a constant.
         | Physics are constants. If Rome wrote an engineering manual, it
         | would still be quite valid today.
         | 
         | Imagine if we had standardized software engineering in 2003. Do
         | you think the mandatory training about how to make safe ActiveX
         | controls is going to save you? Do you think the mandatory
         | training on how to safely embed a Java applet will protect your
         | bank?
         | 
         | Software is too diverse, too inconsistent, and too rapidly
         | changing to have any chance at standardization. Maybe in
         | several decades when WHATWG hasn't passed a single new spec
         | into the browser.
         | 
         | (Edit: Also, it's a fool's errand, as there are literally
         | hundreds of billions of lines of code running in production at
         | this very moment. If you wrote an onerous engineering spec;
         | there would not be enough programmers or lawyers on earth to
         | rewrite and verify it all, even if given decades. This would
         | result in Google, Apple, etc. basically getting grandfathered
         | in while startups get the burden of following the rules - rules
         | that China, India, and other countries happily won't be
         | enforcing.)
        
           | 2OEH8eoCRo0 wrote:
           | I'd imagine we wouldn't have ActiveX controls in the first
           | place.
        
             | gjsman-1000 wrote:
             | Wishful thinking - the IRS is still running on COBOL; our
             | nuclear weapons until a few years ago on Windows 95. The
             | NYC subway still has a lot of OS/2.
             | 
             | Standardization _does not_ stop bad engineering. Those who
             | think it does have not witnessed the catastrophe a bad
             | standard can cause. Go download and implement the Microsoft
             | Office OOXML standard - it's freely available, ISO
             | approved, 6000 pages, and an abomination that not even
             | Google claims to have correctly implemented.
        
               | 2OEH8eoCRo0 wrote:
               | You're making some points for me. You are assuming COBOL,
               | Windows 95, or OS/2 are bad because they're old. Such
               | assumptions are the antithesis of "engineering."
        
               | gjsman-1000 wrote:
               | Old technology isn't necessarily bad in itself. It's well
               | documented and understood.
               | 
               | Where it's bad is when the equipment to run that software
               | no longer is manufactured. You can't get a new computer
               | to run Windows 95. Not even in the military. Your only
               | option is to virtualize, adding a huge possible failure
               | mode that was never considered previously.
               | 
               | Where it's bad is when changes are needed to adapt to
               | modern environments, and nobody's quite sure about what
               | they are doing anymore. There's no test suite, never was,
               | the documentation is full of ancient and confusing
               | terminology, mistakes are made.
               | 
               | And on and on...
        
               | jfengel wrote:
               | It sounds as if you're saying that these were bad things
               | because they were always bad. And maybe they were. But we
               | might never have any software at all if we only had good
               | software.
        
               | 2OEH8eoCRo0 wrote:
               | I'm not saying they're bad because I don't know.
        
               | jfengel wrote:
               | Apologies. I misread your intentions.
        
           | theideaofcoffee wrote:
           | There is nothing saying that allowing for some
           | standardization means that we have to be stuck at 2003-levels
           | of state of the art. And actually, yes many engineering
           | disciplines do change, Civil engineering brings in new
           | construction techniques, methods for non-destructive testing,
           | improvements to materials and on and on, but it doesn't do so
           | like the coked-up industry of software does it in such a
           | free-for-all manner. It's a proper engineering discipline
           | because there's the control, testing the best way to do
           | things and rolling that out.
           | 
           | If we (meaning software 'engineers' and I tepidly include
           | myself in that group) had half the self control in
           | introducing insanity like the 10000th new javascript
           | framework to read and write to a database like the 'proper'
           | disciplines do, maybe it would be better because there's less
           | churn. Why does it have to move so fast? Software is diverse
           | and inconsistent and rapidly changing because 'the industry'
           | (coked-out developers chasing the next big hit to their
           | resume to level up) says it should. I just don't agree that
           | we need that amount of change to do things that amount to
           | mutating some data. If the techniques didn't grow beyond what
           | was cool in 2007, or they were held there until the next
           | thing could be evaluated and trained, but the knowledge and
           | process around them did, perhaps we'd be in a better
           | position. I know I certainly wouldn't mind maintaining
           | something that was created in the last decade of the previous
           | millennium knowing it was built with some sort of self-
           | control and discipline in mind, and that the people working
           | on it with me had the same mindset as well.
        
             | gjsman-1000 wrote:
             | Simple - if you restrict the software industry, the US
             | loses to China or any other country that doesn't give a
             | damn. And unless you censor the internet, there's
             | absolutely no way to prevent illicit software from crossing
             | the border.
             | 
             | Would a business get in trouble for using it? Sure. But if
             | all the businesses in your country are at a competitive
             | disadvantage because the competition is so much brighter
             | elsewhere, and that "sloppy constructed" software is
             | allowing international competition to have greater
             | productivity and efficiency, your country is hosed. Under
             | your own theory, imagine if the US was stuck with ~2007
             | technology while China was in 2024. The tradeoff would be
             | horrific - like, Taiwan might not exist right now,
             | horrific.
             | 
             | Regulating software right now would kill the US competitive
             | advantage. It narrows every year - that would do it
             | overnight. The US right now literally cannot afford to
             | regulate software. The EU, which can afford it, is already
             | watching talent leaving.
             | 
             | There's also the problem of the hundreds of billions of
             | lines of code written before regulations running in
             | production at this very moment. There are not enough
             | programmers on earth that could rewrite it all to spec,
             | even if they had decades. Does Google just get a free
             | grandfathered-in pass then, but startups don't?
        
           | figassis wrote:
           | Physics will still be the same when your faulty software
           | tells an airplane to dive.
        
           | BartjeD wrote:
           | This is so wrong
           | 
           | Most suspension bridges were built without a theoretical
           | model, because didnt have one yet. Theory caught up much
           | later.
           | 
           | Innovation often happens in absence of Theory.
        
             | hollerith wrote:
             | >Most suspension bridges were built without a theoretical
             | model
             | 
             | That's not true, even for the first suspension bridge ever
             | built (in the early 1800s), but it is true for example that
             | many useful and impressive aircraft were built before the
             | development of a physical theory of flight.
        
               | BartjeD wrote:
               | Galloping gertie is an example in America.
               | 
               | Your definition of theory only fits if you scope it so
               | narrow that it's useless to the problem space.... Because
               | the point is that theory didn't entirely cover that
               | space. And bridges did collapse because of that.
               | 
               | But lack of theory didn't mean lack of rigorous testing.
               | Gergie was built based on theory. Many other bridges were
               | based on testresults..and did fine.
        
               | hollerith wrote:
               | You've retreated from, "built without a theoretical
               | model, because didn't have one yet," way back to, "theory
               | didn't entirely cover that space." This is commendable.
               | 
               | >Many other bridges were based on test results
               | 
               | I'm going to go out on a limb a little and assert that
               | not a single bridge was built out of steel or iron in the
               | last 200 years in the US or the UK without a static
               | analysis of the compressive and tensile forces on all the
               | members or (in the case of bridges with many hundreds of
               | small members) at least the dozen largest members or
               | assemblies.
        
           | Anechoic wrote:
           | _Civil engineering doesn't change. Gravity is a constant.
           | Physics are constants.
           | 
           | Physics may be a constant, but materials and methods are not.
           | There is a reason why
           | ISO/IEC/ICC/ASTM/ANSI/ASME/ASHRAE/DIN/IEEE/etc standards have
           | specific dates associated with them.
           | 
           | _If Rome wrote an engineering manual, it would still be quite
           | valid today.*
           | 
           | Considering many engineering standards from a few years ago
           | are no longer valid, this is almost certainly not true.
        
             | gjsman-1000 wrote:
             | That's only a formality, but reality did not change, and
             | neither did the fact that those standards would still work
             | even if they would be slightly inferior.
        
             | thaumasiotes wrote:
             | >> If Rome wrote an engineering manual, it would still be
             | quite valid today.
             | 
             | We have some ancient engineering manuals. A book I read,
             | most likely _Brotherhood of Kings_ , remarked that
             | Mesopotamian engineering manuals are primarily concerned
             | with how many bricks will be required for a given
             | structure.
             | 
             | The manuals are valid today, I guess, but useless. We
             | prefer pipelines to brick aqueducts. Our fortresses are
             | made of different materials and need to defend us from
             | different things.
        
           | jjmarr wrote:
           | In Canada, we have software and computer engineering programs
           | accredited by the same entity (CEAB) that does civil
           | engineering.
           | 
           | My program is more out of date (Java Server Pages, VHDL) but
           | the school can't lower the quality of their programs.
           | Generally, the standard learning requirements aren't on
           | technology but principles, like learning OOP or whatever
           | else. The CEAB audits student work from all schools in Canada
           | to make sure it meets their requirements.
           | 
           | The culture itself is probably the most important part of the
           | engineering major. They don't round up. If you fail, you
           | fail. And I had a course in 3rd year with a 30% fail rate.
           | Everything's mandatory, so you just have to try again over
           | the summer.
           | 
           | A lot of people drop out because they can't handle the
           | pressure. But the people that stay understand that they can't
           | skip out on stuff they aren't good at.
        
             | toast0 wrote:
             | I've got an ABET accredited Computer Engineering degree
             | from a US school. The only thing it got me in interviews
             | was questions about why not CS.
             | 
             | I did not follow the path to become a licensed Professional
             | Engineer, because a) there was no apparent benefit, b) to
             | my knowledge, none of my colleauges were PEs and I don't
             | know how I would get the necessary work certification.
             | 
             | Maybe there's corners of software where it's useful to
             | become licensed, but not mine.
        
           | 8note wrote:
           | Gravity is not constant, instead it varies by location and by
           | height.
           | 
           | Bubble sort however, is always bubble sort. A similarly large
           | portion of what engineers do with in software is constant
        
         | 2OEH8eoCRo0 wrote:
         | > Is there any path for software engineers to reach this level
         | of accountability and norms of good practice?
         | 
         | There is no reason that software couldn't be treated with the
         | same care and respect. The only reason we don't is because the
         | industry resists that sort of change. They want to move fast
         | and break things while still calling themselves "engineers."
         | Almost none of this resembles engineering.
        
           | wizzwizz4 wrote:
           | > Software engineering, of course, presents itself as another
           | worthy cause, but that is eyewash: if you carefully read its
           | literature and analyse what its devotees actually do, you
           | will discover that software engineering has accepted as its
           | charter "How to program if you cannot.".
           | 
           | -- Edsger Wybe Dijkstra, 1988. (EWD1036)
        
             | jfengel wrote:
             | I'm ok with that. I don't want to keep everyone out except
             | just those who happen to have just the right mind set.
             | Programming is about developing software for people, and
             | the more viewpoints are in the room, the better.
             | 
             | Some pieces are more important than others. Those are the
             | bits that need to be carefully regulated, as if they were
             | bridges. But not everything we build has lives on the line.
             | 
             | If that means we don't get to call ourselves "engineers",
             | I'm good with that. We work with bits, not atoms, and we
             | can develop our own new way of handling that.
        
               | 2OEH8eoCRo0 wrote:
               | I prefer to call it "computer programming." If the title
               | is good enough for Ken Thompson or Don Knuth then it's
               | good enough for me.
        
               | wizzwizz4 wrote:
               | > _I don 't want to keep everyone out except just those
               | who happen to have just the right mind set._
               | 
               | Neither do I. Neither did Dijkstra. EWD1036, "On the
               | cruelty of really teaching computing science", is about
               | education reform, to enable those who _don 't_ "happen to
               | have just the right mind set" to fully participate in
               | actual, effective programming.
        
               | WarOnPrivacy wrote:
               | > If that means we don't get to call ourselves
               | "engineers", I'm good with that.
               | 
               | I suspect this particular title-exaggeration is fueling
               | this particular fire.
               | 
               | Going forward, I believe we need to be aware that
               | software controlled mechanics grew out of two disparate
               | disciplines; it presently lacks the holistic thinking
               | that long-integrated industries do.
        
           | figassis wrote:
           | I'm a software engineer, with a degree, and SWE does have the
           | same ethical principles and the same engineering process,
           | from problem definition and requirements a the way to
           | development lifecycle, testing, deployment indigent
           | management, etc. none of it includes sprints and story
           | points.
           | 
           | Suffice it to say most SWEs are not being hired to do actual
           | engineering, bc the industry can't get over the fact that
           | just because you can update and release SW instantly doesn't
           | mean you should.
        
             | JumpCrisscross wrote:
             | > _SWE does have the same ethical principles and the same
             | engineering process_
             | 
             | The lack of certification means this training isn't
             | reinforced to the degree it is in engineering.
        
               | WarOnPrivacy wrote:
               | Right. If the coding industry mimics the construction
               | industry, we wind up with one position called engineer
               | that assumes most of the liability.
               | 
               | The other 99.99....% of software engineers will get
               | different titles.
               | 
               | All of this ignores the individuals who are most
               | responsible for these catastrophes.
               | 
               | Investors and executives deliver relentless and effective
               | pressure toward practices that maximize their profits -
               | at the expense of all else.
               | 
               | They purposefully create + nurture a single point of
               | failure and are massively rewarded for the harm that
               | causes (while the consequences are suffered by everyone
               | else). Thanks to the pass they reliably get, we get their
               | leadership design degrading every industry it can.
        
               | JumpCrisscross wrote:
               | > _If the coding industry mimics the construction
               | industry, we wind up with one position called engineer
               | that assumes most of the liability_
               | 
               | If their sign off is required, this could work. The
               | question is whether it's worth it, and if it is, in which
               | contexts.
        
         | belter wrote:
         | https://zlk.com/pslra-1/crowdstrike-lawsuit-submission-form?...
         | 
         | https://www.sauderschelkopf.com/wp-content/uploads/2024/07/A...
        
         | MattGaiser wrote:
         | > Are the licenses so ironclad that customers have no recourse?
         | 
         | Even on Hacker News, there was agreement that CrowdStrike
         | screwed up, but then people also blamed IT staff, Microsoft
         | (even after realizing it was a CrowdStrike issue), and the
         | EU/regulators.
         | 
         | I imagine responsibility of each entity would need far more
         | clarification than it does now.
         | 
         | If you want to define liability, there needs to be a clear line
         | saying who is responsible for what. That doesn't currently
         | exist in software.
         | 
         | There are also considering how people respond to risk.
         | 
         | Consider how sesame regulation led to most bread having sesame
         | deliberately put into it. Industry responded by guaranteeing
         | contamination.
         | 
         | Crowdstrike and endpoint security firms might respond by saying
         | that only Windows and Mac devices can be secured. Or Microsoft
         | may say that only their solution can provide the requisite
         | security.
        
         | miki123211 wrote:
         | Civil engineering mostly requires you to have a government-
         | verified certificate and to work in the country your
         | infrastructure will be deployed in.
         | 
         | Software engineering doesn't, and that makes criminal
         | prosecutions that much harder. There's no path to making it
         | happen.
         | 
         | Financial liability for the company in question? Sure, that's
         | probably doable. "Piercing the corporate veil" and punishing
         | the executives who signed off on it? Harder but not impossible.
         | Punishing the engineer who wrote that code, and who lives in a
         | country with no such laws? Won't happen.
        
           | WarOnPrivacy wrote:
           | > Civil engineering mostly requires you to have a government-
           | verified certificate and to work in the country your
           | infrastructure will be deployed in.
           | 
           | It's a relatively small (and sharply defined) pool of people
           | who can be called a civil engineer.
           | 
           | Are we saying we want to segment software engineering (from
           | coding) - the same way civil engineering is segmented from
           | construction?
           | 
           | Otherwise we're talking about placing specialist liability
           | upon a non-specialist group. This seems unethical.
        
         | JumpCrisscross wrote:
         | > _If a bridge collapses, there's not only financial liability
         | but the potential for criminal liability as well_
         | 
         | If a bridge collapses people die. To my knowledge, nobody died
         | or was put in mortal peril as a result of the Crowdstrike
         | debacle.
        
           | rightbyte wrote:
           | The deaths if any where probably indirect. E.g. ambulances
           | not turning up in time etc. due to paper and pen fallbacks.
           | 
           | With all the hospitals victim of the attack, I would be
           | surprised if the amount of patients that died are zero.
        
             | JumpCrisscross wrote:
             | > _E.g. ambulances not turning up in time etc. due to paper
             | and pen fallbacks_
             | 
             | Sure. Did this happen?
             | 
             | Why were the "emergency management downtime procedures"
             | insufficient [1]?
             | 
             | [1] https://www.healthcaredive.com/news/crowdstrike-outage-
             | hits-...
        
               | bt1a wrote:
               | Probably because our incredibly inefficient, burdened,
               | and splintered healthcare system barely functions as is,
               | and they do not have the time nor resources to pause and
               | put in place an emergency downtime operating protocol
               | that works as well as their 15 year old windows cobweb
        
               | JumpCrisscross wrote:
               | > _because our incredibly inefficient, burdened, and
               | splintered healthcare system barely functions as is, and
               | they do not have the time nor resources to pause and put
               | in place an emergency downtime operating protocol_
               | 
               | You just responded to an article about the implementation
               | of emergency downtime protocols by speculating,
               | baselessly, that such protocols cannot possibly exist
               | because your mental model of our healthcare system
               | prohibits it. Ironically, all within the context of why
               | software development doesn't hold itself to the rigors of
               | engineering.
        
               | tgsovlerkhgsel wrote:
               | If they were equally good as the non-emergency
               | procedures, why wouldn't we use them all the time?
        
               | JumpCrisscross wrote:
               | > _why wouldn 't we use them all the time?_
               | 
               | Because they're more expensive. They're all not "equally
               | good," they're good enough to keep people alive. (You
               | repurpose resources from elective and billing procedures,
               | _et cetera_.)
        
               | FireBeyond wrote:
               | This belies a lack of understanding.
               | 
               | What resources are you repurposing from elective
               | procedures exactly? Your patient load hasn't changed, and
               | day surgical instruments and supplies are from the same
               | pool. There's no "well this pile of equipment is only for
               | elective procedures".
               | 
               | I'm not even sure what "billing procedures you'd
               | repurpose (especially in your context of "keeping people
               | alive").
        
               | JumpCrisscross wrote:
               | > _Your patient load hasn't changed, and day surgical
               | instruments and supplies are from the same pool_
               | 
               | The outage didn't change any of these things either.
               | 
               | > _not even sure what "billing procedures you'd
               | repurpose_
               | 
               | At Mount Sinai, billing staff were redirected to watch
               | newborn babies. Apparently the electronic doors stopped
               | working during the outage.
        
               | Log_out_ wrote:
               | Because energencx downtime is not supossed to be local
               | and global. Dont worry your startup will not eat those
               | riscs, but neither will those customers stay once
               | insurrance rewrites the guidlines. All that can
               | happen,has already happened, its just consequences
               | propagating now. Nothing we can do with simple
               | blameshifting tactics.
        
               | rightbyte wrote:
               | "In Alaska, both non-emergency and 911 calls went
               | unanswered at multiple dispatch centers for seven hours.
               | 
               | Some personnel were shifted to the centers that were
               | still up and running to help with their increased load of
               | calls, while others switched to analog phone systems,
               | Austin McDaniel, state public safety department
               | spokesperson, told USA TODAY in an email. McDaniel said
               | they had a plan in place, but the situation was
               | "certainly unique."
               | 
               | Agencies in at least seven states reported temporary
               | outages, including the St. Louis County Sheriff's Office,
               | the Faribault Police Department in Minnesota, and 911
               | systems in New Hampshire, Fulton County, Indiana, and
               | Middletown, Ohio. Reports of 911 outages across the
               | country peaked at more than 100 on Friday just before 3
               | a.m., according to Downdetector.
               | 
               | In Noble County, Indiana, about 30 miles northwest of
               | Fort Wayne, 911 dispatchers were forced to jot down notes
               | by hand when the system went down in the early morning
               | hours, according to Gabe Creech, the county's emergency
               | management director."
               | 
               | https://eu.usatoday.com/story/news/nation/2024/07/19/crow
               | dst...
               | 
               | I mean, even if the dispatch could handle it in some
               | sense, certainly it was a problem, that might have
               | increased average time to site for the ambulance or fire
               | fighters. I've haven't seen any report of any direct
               | death.
        
               | JumpCrisscross wrote:
               | > _I 've haven't seen any report of any direct death_
               | 
               | Exactly. Contrast that with a bridge collapse. It isn't a
               | mystery or statistical exercise to deduce who died and
               | why.
        
               | varjag wrote:
               | There were numerous bridge collapses without casualties.
               | Naturally if one company could suddenly collapse 80% of
               | Earth's bridges, direct deaths would be assured. It's
               | great there isn't one for some reason!
        
               | JumpCrisscross wrote:
               | > _were numerous bridge collapses without casualties_
               | 
               | In how many of those cases were criminal charges brought?
               | (It's not zero. But it's more limited.)
        
           | SkiFire13 wrote:
           | Hospitals were affected too, I don't think it's that far
           | fetched to think some people died, or at least some could not
           | have been saved due to this incident.
        
             | JumpCrisscross wrote:
             | > _Hospitals were affected too, I don 't think it's that
             | far fetched to think some people died_
             | 
             | Absent evidence I'd say it is.
             | 
             | Hospitals have emergency downtime procedures [1]. From what
             | I can tell, the outage was stressful, not deadly.
             | 
             | [1] https://www.npr.org/2024/07/21/nx-s1-5046700/the-
             | crowdstrike...
        
               | tgsovlerkhgsel wrote:
               | Apply additional stress to a sufficiently large system
               | that human lives depend on, and someone, somewhere will
               | die.
        
               | JumpCrisscross wrote:
               | > _Apply additional stress to a sufficiently large system
               | that human lives depend on, and someone, somewhere will
               | die_
               | 
               | Sure. Who did?
               | 
               | When a bridge collapses, this isn't a tough problem. We
               | don't need to reason from first principles to derive the
               | dead bodies. That's the difference.
        
           | bt1a wrote:
           | I am positive that people in hospitals died as a direct
           | result of this incident.
        
             | JumpCrisscross wrote:
             | > _I am positive that people in hospitals died as a direct
             | result of this incident_
             | 
             | Do you have clinical or hospital administration experience?
             | A source with evidence, even circumstantial?
        
               | bt1a wrote:
               | Yes
        
               | JumpCrisscross wrote:
               | > Do you have clinical or hospital administration
               | experience? A source...
               | 
               | >> Yes
               | 
               | You managed a hospital and failed to implement emergency
               | downtime procedures? (Because _that_ is actually
               | criminal.) Or do you have a source?
        
               | cholantesh wrote:
               | Deft goalpost shifting, nice.
        
               | FireBeyond wrote:
               | Apropos of anything else, "emergency downtime procedures"
               | do not guarantee the same level of care as normal
               | operations. I've worked in and out of hospitals as a
               | critical care paramedic for years.
        
               | JumpCrisscross wrote:
               | > _"emergency downtime procedures" do not guarantee the
               | same level of care as normal operations_
               | 
               | Agreed. It's also plausible someone had a heart attack
               | due to the stress of flight cancellations. Do we have any
               | evidence of either?
               | 
               | The difference between a bridge collapsing and everything
               | we're discussing is there isn't much of a discussion
               | around who died and why.
        
               | RobRivera wrote:
               | Are you the orangutan doctor from futurama?
        
               | JumpCrisscross wrote:
               | The commenter said they did not believe hospitals "have
               | the time nor resources to pause and put in place an
               | emergency downtime operating protocol" [1]. That is a
               | reasonable guess. It's not something one would expect
               | from someone with "clinical or hospital administration
               | experience."
               | 
               | It's a glib response, but so is "yes" to a request for
               | attribution.
               | 
               | [1] https://news.ycombinator.com/item?id=41217683
        
           | trentnix wrote:
           | Hospitals and doctor's offices were paralyzed by the outage.
           | Transplant organs are often delivered by couriers on
           | commercial flights. Many pharmacies were unable to fulfill
           | prescriptions.
           | 
           | It wasn't just vacation travelers that were affected by
           | Crowdstrike's incompetence.
        
         | LordKeren wrote:
         | There is recourse, just not for normal people, as you eluded
         | to. Companies are and will be continuing to sue crowdstrike,
         | and based on the papers that crowdstrike has posted, the
         | impacted companies are extremely likely to be successful. It
         | seems overwhelmingly likely that the companies are going to be
         | able to convince a judge/jury/arbiter that crowdstrike acted
         | grossly negligent and very plainly caused both direct losses
         | and indirect reputational harm to the companies.
         | 
         | I'm not sure crowdstrike will even fight it, to be honest. I
         | would assume most of this is going to be settled out of court
         | and we will see crowdstrike crumble in the coming years.
        
           | JumpCrisscross wrote:
           | > _not sure crowdstrike will even fight it_
           | 
           | To my knowledge only Delta is suing and CrowdStrike is
           | kicking and screaming about it [1].
           | 
           | [1] https://www.cnn.com/2024/08/05/business/crowdstrike-
           | fires-ba...
        
             | LordKeren wrote:
             | It's a really bad look for crowdstrike to be going down
             | this route. Then again, I don't think many companies are
             | going to be adopting crowdstrike in the coming years, so I
             | suppose their only option is to defend their stock value at
             | any cost while the company recoils
        
           | dredmorbius wrote:
           | NB: _alluded_ , not _eluded_.
           | 
           | <https://dict.org/bin/Dict?Form=Dict2&Database=gcide&Query=Al
           | ...>
           | 
           | <https://dict.org/bin/Dict?Form=Dict2&Database=gcide&Query=el
           | ...>
        
         | jedberg wrote:
         | Delta threatened to sue them for their $500M loss. Crowdstrike
         | replied (publicaly) pointing out that their contract limits
         | Crowdstrike's liability to single digit millions.
         | 
         | Then then gave them a list of things they would seek in
         | discovery, such as their backup plans, failover plans, testing
         | schedules and results, when their last backup recover exercise
         | was, etc.
         | 
         | Basically, they said, "if you sue us, we will dig so deep into
         | your IT practices that it will be more embarrassing for you
         | than us and show that you were at fault".
        
           | JumpCrisscross wrote:
           | > _they said, "if you sue us, we will dig so deep into your
           | IT practices that it will be more embarrassing for you than
           | us and show that you were at fault"_
           | 
           | But CrowdStrike said this publicly. If they'd privately
           | relayed it to Delta, it would have been genuine. By
           | performatively relaying it, however, it seems they're pre-
           | managing optics around the expected suit.
        
             | gnfargbl wrote:
             | Or attempting to discourage it from becoming a pile-on.
        
             | magic_man wrote:
             | It doesn't matter it was 100% crowdstrikes fault. Surprised
             | its still worth 60billion dollars.
        
               | from-nibly wrote:
               | Part of the problem is assuming you can pay a contract to
               | shift your liability completely away.
        
               | iwontberude wrote:
               | Well if MSFT knew how to write MSAs Crowdstrike would
               | have become property of Microsoft.
        
               | unyttigfjelltol wrote:
               | Right, the risk structure presumably protects the vendor
               | if just one customer sues, even if the amount of damages
               | claimed is astronomical. Because vendors try to disclaim
               | bet-the-company liability on a single contract.[1] The
               | vendor's game is to make sure the rest of the customer
               | base does not follow this example, because as noted in
               | the linked article while vendors don't accept _bet-the-
               | company_ liability on each contract (or try not to), they
               | _do_ normally have some significant exposure measured in
               | multiples of annual spend.
               | 
               | [1] https://www.gs2law.com/blog/current-trends-in-
               | liability-limi...
        
               | TeMPOraL wrote:
               | The assumption is not only perfectly valid, it's the very
               | reason such contracts are signed in the first place! It's
               | what companies want to buy, and it's what IT security
               | companies exist to sell.
        
               | pknomad wrote:
               | Yes and no.
               | 
               | Crowdstrike was the executioner of this epic fail for
               | sure but their archaic infra practices made it even
               | worse. Both Crowdstrike and Microsoft CEOs reached out
               | only to be rebuffed by Delta's own. If I was the CEO -
               | I'd accept any help I can get while you have the benefit
               | of the public opinion.
               | 
               | /tin-foil-hat-on Flat out refusal for help makes me think
               | there are other skeletons in the closet that makes Delta
               | look even worse /tin-foil-hat-off
        
               | JumpCrisscross wrote:
               | > _I was the CEO - I 'd accept any help I can get while
               | you have the benefit of the public opinion_
               | 
               | I'd reserve judgement. Delta may have been cautious about
               | giving the arsonists a wider remit.
        
               | pknomad wrote:
               | Using your analogy - if MS/CS are the arsonists, then
               | Delta are the landlords unsafely storing ammonium nitrate
               | in their own warehouse.
               | 
               | Their lack of response to MS/CS isn't coming from a place
               | of reducing potential additional problems but trying to
               | shield their own inadequacies while a potential lawsuit
               | is brewing in the background.
               | 
               | https://www.reuters.com/technology/microsoft-blames-
               | delta-it...
        
               | evilduck wrote:
               | If you held the view that CrowdStrike and Microsoft were
               | inherently to blame for the problem why would you trust
               | them to meaningfully help? At best they're only capable
               | of getting you right back into the same position that
               | left you vulnerable to begin with.
        
               | pknomad wrote:
               | Same reason why an aircraft manufacturing company would
               | get involved in a NTSB investigation when there is an
               | airplane crash. Just because they messed up one or more
               | things (i.e. MCAS on MAX) doesn't mean they can't provide
               | expertise or additional resources to at least help with
               | the problem.
               | 
               | Your take also casually disregards the fact that Delta
               | took an extraordinary time to recover from the problem
               | when the other companies recovered (albeit slowly). This
               | is the point that I'm getting at. It isn't that CS and MS
               | aren't culpable for the outage; it's that DAL also
               | contributed to the problem by not adequately investing in
               | its infra.
        
             | cyanydeez wrote:
             | Weirdly, we live in a society
        
             | wjnc wrote:
             | It's an argument that hits home at any bigcorp where the
             | execs are entertaining the thought of suing CrowdStrike.
             | Making it public once is a lot more effective than relaying
             | it privately a hundred times. I expect most liability to
             | come from abroad, where parts of the contract might be
             | annulled because not in line with local law. But still I
             | don't expect it. CrowdStrike delivered the service they
             | promised. The rest is on the customers IT. Hand over the
             | keys and your car may be driven.
        
               | JumpCrisscross wrote:
               | > _It's an argument that hits home at any bigcorp where
               | the execs are entertaining the thought of suing
               | CrowdStrike_
               | 
               | Maybe? Discovery is a core element of any lawsuit. It's
               | also a protected process: you can't troll through
               | confidential stuff with an intent to make it public to
               | damage the litigant.
               | 
               | If anything, I could see Delta pointing to this statement
               | to restrict what CrowdStrike accesses and how [1]. (As
               | well as with the judge when debating what gets redacted
               | or sealed.)
               | 
               | [1] https://www.fjc.gov/sites/default/files/2012/Confiden
               | tialDis...
        
             | tedunangst wrote:
             | Seems fair. Delta didn't privately relay their intentions.
        
           | reaperducer wrote:
           | _Delta threatened to sue them for their $500M loss.
           | Crowdstrike replied (publicaly) pointing out that their
           | contract limits Crowdstrike 's liability to single digit
           | millions._
           | 
           | Delta's move seems like an attempt to assuage shareholders
           | and help the C.E.O. save face.
           | 
           | Crowdstrike shouldn't be afraid of Delta. Crowdstrike should
           | be afraid of the insurance companies that have to pay out to
           | those businesses that have coverage that includes events like
           | this.
           | 
           | Even if the payout to a company is $10,000, a big insurance
           | company may have hundreds or thousands of similar payouts to
           | make. The insurance companies won't just let that go; and
           | they know exactly what to look for, how to find it, and have
           | the people, lawyers, and time to make it happen.
           | 
           | Crowdstrike will get its day of reckoning. It won't be today.
           | And it probably won't be public. But the insurance companies
           | will make sure it comes, and it's going to hurt.
        
             | JumpCrisscross wrote:
             | > _the insurance companies will make sure it comes, and it
             | 's going to hurt_
             | 
             | It could be as simple as a reinsurer refusing to renew
             | coverage if a company uses CrowdStrike.
        
               | vladvasiliu wrote:
               | Which would be funny, since many companies are putting up
               | with Crowdstrike to make insurers happy.
        
               | dredmorbius wrote:
               | Availability (or not) of insurance coverage is
               | _surprisingly_ effective in enabling or disabling various
               | commercial ventures.
               | 
               | The penny dropped for me whilst reading James Burke's
               | _Connections_ on the exceedingly-delayed introduction of
               | the lateen-rigged sail to Europe, largely on the basis
               | that the syndicates which underwrote (and insured)
               | shipping voyages wouldn 't provide financing and coverage
               | to ships so rigged.
               | 
               | Far more recently we have notions of redlining for both
               | mortgage lending and insurance coverage (title, mortgage,
               | property, casualty) in inner-city housing and retail
               | markets. Co-inventor of packet-based switching writes of
               | his parents' experience with this in Philadelphia:
               | 
               | "On the Future Computer Era: Modification of the American
               | Character and the Role of the Engineer, or, A Little
               | Caution in the Haste to Number" (1968)
               | 
               | <https://www.rand.org/pubs/papers/P3780.html> (footnote,
               | p. 6).
               | 
               | Similarly, government insurance or guarantees (Medicare,
               | SSI, flood insurance, nuclear power plants) has made
               | high-risk prospects possible, or enabled effective
               | services and markets, where _laissez-faire_ approaches
               | would break down.
               | 
               | I propose that similar approaches to issues such as
               | privacy violation might be worth investigating. E.g.,
               | voiding any insurance policy over damages caused through
               | the harmful use or unintended disclosure of private
               | information. Much of the current surveillance-capitalism
               | sector would instantly become toxic. The principle
               | current barriers to this are that states themselves
               | benefit through such surveillance, and of course the
               | current industry is highly effective at lobbying for its
               | continuance.
        
           | trentnix wrote:
           | They should be providing all that information regularly to
           | auditors anyway. If they don't have it handy, then their IT
           | leadership should be replaced.
        
           | mc32 wrote:
           | That's odd. One is an internal process which has no
           | obligation to an external party, and the other one who is
           | specifically responsible for being liable for any
           | repercussions due to deviating from their own SDLC
           | process[1]they totally skipped themselves?
           | 
           | If I were Delta, I'd get other affected parties and together
           | sue CrowdStrike and get all their dirty laundry out in the
           | open.
           | 
           | [1] I haven't checked but they used to list all their ISO
           | certs, etc. Wonder if those get revoked for such glaring
           | violations...
        
             | reaperman wrote:
             | Civil suits focus in a large way on determining how much
             | damage is each party's fault. So Crowdstrike would be
             | saying "Of this $500M in damages, x% was from your own
             | shitty practices not from our mistake". Thats why it's all
             | pertinent.
        
             | MattGaiser wrote:
             | > One is an internal process which has no obligation to an
             | external party
             | 
             | Delta has obligations to their passengers and similarly
             | sidesteps screw ups with similar contractual provisions.
             | How much would Delta owe for not following similar IT
             | practices? Do they now owe customers for their IT failings?
             | Should customers now get to sue Delta for damages related
             | to their poor IT recovery compared to other airlines?
        
               | mc32 wrote:
               | Sure but that'd be something passengers could bring up in
               | a suit against Delta, not someone like CS, who themselves
               | obviously skipped their own internal SDLC and whatever
               | other ISO certs they prominently advertised on their
               | website.
        
               | dredmorbius wrote:
               | Crowdstrike's discovery process would greatly aid in
               | passenger or general-public suits against Delta.
        
               | jc2jc wrote:
               | I assume the argument is that if they can show negligence
               | in their IT practices, then the $500 million in damages
               | can't be all attributed to CrowdStrike's failure.
        
           | VirusNewbie wrote:
           | They might find out delta does embarrassing things like not
           | testing out of bounds array access or does global deployments
           | without canarying.
        
           | richardw wrote:
           | I'm not sure anything else was material given that the
           | machines were bricked and client roll-out approaches were
           | evaded by Crowdstrike. What client actions would have helped?
           | 
           | Surely someone is looking at a class action? People died. The
           | contract can't make that everyone else's problem, can it?
        
             | lupire wrote:
             | If someone's life depends on a networked Windows (or any
             | similar OS) machine you chose to run for that purpose, you
             | are the criminal.
        
               | 1over137 wrote:
               | Indeed. But this is how hospitals run.
        
             | gizmo686 wrote:
             | Sure it can. If every rock climbing company in the country
             | decides that climbing ropes are too expensive and instead
             | decide to by rope from the local hardware store, and that
             | rope has a warning reading "not for use when life or
             | valuable property is at risk", then it is 100% on those
             | climbing companies when people die, because they were using
             | a product in a situation that it was simply not suitable
             | for.
             | 
             | The details, of course, depend on the contract and claims
             | that Crowdstrike made. But, in the abstract, you are not
             | responsible for making your product suitable for any use
             | that anyone decides to use it for.
             | 
             | If a hospital wants to install software on their life
             | critical infastructure, they are supposed to buy software
             | that is suitable for life critical infastructure.
        
           | mikeocool wrote:
           | It really seems funny that Crowdstrike's defense is basically
           | "you should have been better prepared for us to knock all of
           | your systems offline."
           | 
           | It's probably true, but seems like an odd stance to take from
           | a PR perspective or a "selling other clients in the future"
           | perspective.
        
             | jedberg wrote:
             | In the case of Delta, their outage was much longer than
             | everyone else because they refused help from both
             | Crowdstrike and Microsoft. So their defense is basically
             | "the damages could have been mitigated if you'd listened to
             | us".
        
               | NavinF wrote:
               | > they refused help from both Crowdstrike and Microsoft
               | 
               | Link?
               | 
               | Anyway I find it highly amusing that Delta is seeking
               | damages from Microsoft even though Microsoft had nothing
               | to do with it.
        
               | jedberg wrote:
               | There are many articles about them refusing help, but
               | here is one:
               | 
               | https://www.theverge.com/2024/8/6/24214371/microsoft-
               | delta-l...
        
               | cratermoon wrote:
               | Delta's position is the Microsoft actively recommended
               | and coordinated with CrowdStrike to the extent that they
               | are co-responsible for outcomes. In a large enterprise
               | like Delta, the vendors do work together in deployment
               | and support. Yes, there's often a great deal of finger-
               | pointing between vendors when something like this
               | happens, but in general vendors so intimately linked have
               | each other on speed-dial. It would not shock me to learn
               | that Delta has email or chat threads involving
               | CrowdStrike, Microsoft, and Delta employees working
               | together during rollouts and upgrades, prior to this
               | event.
               | 
               | As far as refusing help, why is that funny? If someone
               | does something stupid and knocks you down, it's perfectly
               | reasonable to distrust the help they offer, especially if
               | that help requires giving them _even more_ trust than
               | what they 've already burned.
        
             | cnlwsu wrote:
             | That's kinda what aws tells people when its services go
             | down. If your backend can't take a short outage without
             | weeks of recovery then it's just a matter of time.
        
             | cratermoon wrote:
             | That's kind of typical of how much companies have been
             | allowed to externalize costs. It's never about how the
             | company at fault should have done better, rather it
             | typically boils down to some variant of "the free markets
             | provided you with a choice about who you trust and it was
             | up to you to collect and evaluate all the information
             | available to make your choices".
        
           | icehawk wrote:
           | I'd LOVE to see Crowdstrike do this. The last time I dealt
           | with the specifics of this sort of validation testing for
           | security software was a decade and from what I saw in the RCA
           | Delta can just keep pointing out that whatever they had
           | worked until Crowdstrike failed to understand that the number
           | 20 and the number 21 are not the same:
           | 
           |  _The new IPC Template Type defined 21 input parameter
           | fields, but the integration code that invoked the Content
           | Interpreter with Channel File 291's Template Instances
           | supplied only 20 input values to match against. This
           | parameter count mismatch evaded multiple layers of build
           | validation and testing, as it was not discovered during the
           | sensor release testing process, the Template Type (using a
           | test Template Instance) stress testing or the first several
           | successful deployments of IPC Template Instances in the
           | field._
           | 
           | This combined with the lack of partitioning updates, makes me
           | draw the conclusions they're missing table stakes WRT to
           | validation.
        
         | minkles wrote:
         | Engineering safety culture is built on piles of bodies and
         | suffering unfortunately. I suspect in software the price of
         | failure is mostly low enough that this motivation will never
         | develop.
        
         | xyst wrote:
         | Probably in a decade or so after the AI crash. I have yet to
         | see anything that comes close to "liability" for the digital
         | realm.
         | 
         | US governments and businesses get hacked/infiltrated all the
         | time by foreign adversaries yet we do not declare war. Maybe
         | something happens in the dark or back channels. But we never
         | know.
        
         | dylan604 wrote:
         | A lot of companies have insurance on events causing them to
         | lose sources of income. Whether that's farmers having crop
         | insurance, big box retailers having insurance for catastrophic
         | damage to their big box, I would assume there's something for
         | infrastructure collapse to bring sales to $0 for the duration.
         | 
         | Even if everyone that was affected sued ClownStrike for 100% of
         | their losses, it's not like ClownStrike has the revenue to
         | cover those losses. So even if you're a fan of shutting them
         | down, nobody recovers anything close to actual losses.
         | 
         | So what would you actually propose? Bug free code is pretty
         | much impossible. Some risk is accepted by the user. Do you
         | seriously think that software should be absolutely 100% bug
         | free before being able to be used? How do you prove that? Of
         | course, the follow up would be how clean is your code that you
         | feel that's even achievable?
        
           | Rinzler89 wrote:
           | _> Bug free code is pretty much impossible. Some risk is
           | accepted by the user._
           | 
           | This wasn't your average SW bug, it was gross negligence on
           | behalf of Crowdstreike, who seems to not have heard of SW
           | testing on actual systems and canary deployment. Big
           | difference.
           | 
           | Yeah SW bugs happen all the time but you have to show you
           | took some steps to prevent them, while some dev at
           | Crowdstrike just said "whatever, it works on my machine" and
           | directly pushed to all customer production systems on a
           | Friday. That's the definition of gross negligence that they
           | didn't have any processes in place to prevent something like
           | this.
           | 
           | That's like a surgeon not bothering to sterilize his hands
           | and then saying "oh well, hospital infections happen all the
           | time".
        
             | ncr100 wrote:
             | The bug was egregious.
             | 
             | Using regexp (edit: in the kernel). (Wtf. It's a bloody
             | language.) And not sanitizing the usage. Then using it
             | differently than testing. And boom.
             | 
             | There's people, and there's companies.
             | 
             | This company ought to be nuked.
        
             | dylan604 wrote:
             | > That's like a surgeon not bothering to sterilize his
             | hands and then saying "oh well, hospital infections happen
             | all the time".
             | 
             | And hospitals and doctors have malpractice insurance. They
             | also go through an investigation where they have their own
             | brotherhood where it is difficult to get other doctors to
             | testify against. There's also stories of people writing on
             | their good leg "The other leg" in Sharpie because such
             | moronic mistakes of removing left appendage instead of
             | right. So even doctors are not above negligence. We just
             | have things in place for when they do. Why you think
             | ClownStrike is above that is bewildering.
             | 
             | At the end of the day, mistakes happen. It's not like they
             | have denied they were at fault. So I'm really not sure what
             | you're actually wanting.
        
         | ttymck wrote:
         | > but so far not much in the way of lawsuits
         | 
         | It hasn't been that long? The situation might be that there
         | hasn't been sufficient time to yet gather evidence to commence
         | lawsuits.
        
         | cesarb wrote:
         | > Is there any path for software engineers to reach this level
         | of accountability and norms of good practice?
         | 
         | Yes, time. Civil engineering has thousands of years of history.
         | Software engineering is much newer, the foundations of our
         | craft are still in flux. There have been, at least in my
         | country, legislative proposals for licensure of system
         | analysts, electronic computer programmers, data processing
         | machine operators, and typists(!) since the late 1970s; these
         | laws, if approved, would have set back the progress of software
         | development in my country for several decades (for instance,
         | one proposal would make "manipulation and operation of
         | electronic processing devices or machines, including terminals
         | (digital or visual)" exclusive to those licensed as "data
         | processing machine operator").
        
           | Cpoll wrote:
           | > set back the progress
           | 
           | > exclusive to those licensed
           | 
           | Sounds to me like it just would've made a lot of money for
           | whatever entities give out the licenses.
           | 
           | On the other hand, I've read speculation on here that some
           | countries are short on entrepreneurs entirely due to the
           | difficulty of incorporating a small business, so maybe.
        
         | tsujamin wrote:
         | I'm interested in what those who suffered outages as a result
         | of crowdstrike told their insurers with respect to "QA'ing
         | production changes"
         | 
         | It'd be interesting to see if anyone tries to claim the outage
         | as some sort of insurance event only to lose out because they
         | let Crowdstrike roll updates into a highly regulated
         | environment without testing
        
         | crote wrote:
         | > Civil engineering students have it drilled into their heads
         | that if they behave unethically or otherwise take unacceptable
         | risks as an engineer they face jail time for it. Is there any
         | path for software engineers to reach this level of
         | accountability and norms of good practice?
         | 
         | The problem is that with civil engineering you're designing a
         | physical product. Nothing is ever designed to its absolute
         | limit, and everything is built with a healthy safety margin.
         | You calculate a bridge to carry bumper-to-bumper freight
         | traffic, during a hurricane, when an earthquake hits - and then
         | add 20%. Not entirely sure about whether a beam can handle it?
         | Just size it up! Suddenly it's a lot less critical for your
         | calculations to be exactly accurate - if you're off by 0.5% it
         | just doesn't matter. You made a typo on the design documents?
         | The builder _will_ ask for clarification if you 're trying to
         | fit a 150ft beam into a 15.0ft gap. This means a bridge
         | collapse is pretty much guaranteed to be the result of gross
         | negligence.
         | 
         | Contrast that to programming. A single "<" instead of "<="
         | could be the difference between totally fine and billions of
         | dollars of damages. There isn't a single programmer on Earth
         | who could write a 100% bug-free application of nontrivial
         | complexity. Even the seL4 microkernel - whose whole unique
         | selling point is the fact that it has a formal correctness
         | proof - contains bugs! Compilers and proof checkers aren't
         | going to complain if you ask them to do something which is
         | obviously the wrong thing but technically possible. No sane
         | person would accept essentially unlimited liability over even
         | the smallest mistakes.
         | 
         | If we want software engineers to have accountability, we first
         | have to find a way to separate innocent run-of-the-mill
         | mistakes from gross negligence - and that's going to be
         | _extremely_ hard to formalize.
        
           | Analemma_ wrote:
           | This entire comment boils down to "we can't be held
           | accountable because it's soooo hard you guys", which isn't
           | even convincing to me as someone in the industry and
           | certainly won't be to someone outside it.
        
             | heyoni wrote:
             | What a shallow dismissal of a comment that doesn't even
             | claim that there shouldn't be accountability.
        
               | mvdtnz wrote:
               | His dismissal is absolutely right though. Programmers
               | have gotten way too used to waving their hands at the
               | pubic and saying "gosh I know it's hard to understand but
               | this stuff is so hard". Well no, sorry, there's not a
               | single <= in place of a < that couldn't have been caught
               | in a unit test.
        
               | eropple wrote:
               | You're right, in the case that _it was known to be a
               | problem_. There are lots of places where the  "<= or <"
               | decision can be made, some long before some guy opens a
               | text editor; in those cases, the unit test might not
               | catch anything because the spec is wrong!
               | 
               | A major difference between software development and
               | engineering is that the requirements must be validated
               | and accepted by the PE as part of the engineering
               | process, and there are legal and cultural rails that
               | exist to make that evaluation _protected_ , and as part
               | of that protection more independent--which I think
               | everyone acknowledges is an imperfect independence, but
               | it's a lot further along than software.
               | 
               | To fairly impute liability to a software professional,
               | that software professional needs to be protected from
               | safety-conscious but profit-harmful decisions. This
               | points to some mixture of legislation (and international
               | legislation at that), along with collective bargaining
               | and unionization. Which are both fine approaches by me,
               | but they also seem to cause a lot of agita from a lot of
               | the same folks who want more software liability.
        
               | wizzwizz4 wrote:
               | > _in those cases, the unit test might not catch anything
               | because the spec is wrong!_
               | 
               | That's why you have three different, independent parties
               | design everything important thrice, and compare the
               | results. I'm serious. If you're not convinced this is
               | necessary, just take a look at
               | https://ghostwriteattack.com/riscvuzz.pdf.
               | 
               | (Your other suggestions are _also_ necessary, and I don
               | 't think that would be sufficient.)
        
           | wannacboatmovie wrote:
           | > Contrast that to programming. A single "<" instead of "<="
           | could be the difference between totally fine and billions of
           | dollars of damages.
           | 
           | I fail to see the difference between a misplaced operator and
           | a misplaced bolt (think Hyatt walkway collapse), both of
           | which could have catastrophic consequences. Do you think the
           | CAD software they use to perform the calculations is allowed
           | have bugs simply because it's software?
           | 
           | Maybe go back to entering code on punch cards if you're so
           | fixated on the physical domain being the problem.
        
             | tedunangst wrote:
             | There's a reason we talk about _the_ Hyatt walkway collapse
             | but not _the_ misplaced operator.
        
           | cyberax wrote:
           | This is all true. But we _do_ have known best practices that
           | reduce the impact of bugs.
           | 
           | A most trivial staged rollout would have caught this issue.
           | And we're not talking about multi-week testing, even a few
           | hours of testing would have been fine. Failure to do that
           | rises to the level of gross negligence.
        
           | ang_cire wrote:
           | To add onto this, the Pwnie Awards also go to people who get
           | _attacked_ , which is something that e.g. civil engineers
           | certainly don't get blamed for (i.e. if a terrorist blows up
           | their bridge).
           | 
           | We would need a way to draw a liability line between an
           | incident that involves a 3rd party attack, and one that
           | doesn't, but things like SolarWinds even blur that line where
           | there was blame on both sides. When does something become
           | negligence, versus just the normal patching backlog that
           | _absolutely exists in every company_?
           | 
           | And why are people aiming the gun already at software
           | engineers, rather than management or Product Architects? SE's
           | are the construction workers at the bridge site. Architects
           | and Management are responsible for making, reviewing, and
           | approving design choices. If they're trying to shift that
           | responsibility to SEs by not doing e.g. SCA or code reviews,
           | that's them trying to avoid liability.
           | 
           | Honestly, this reaction by the CEO is great for taking
           | responsibility. Even if there's not legal liability, a lot of
           | companies are still going to ditch CrowdStrike.
        
             | gopher_space wrote:
             | The trade is already a constant struggle with management
             | over cutting corners and short term thinking. I'm not about
             | to be _blamed_ for that situation.
        
             | NobodyNada wrote:
             | > people who get attacked, which is something that e.g.
             | civil engineers certainly don't get blamed for (i.e. if a
             | terrorist blows up their bridge).
             | 
             | There's a really big difference though. In the physical
             | world, an "attack" is always possible with enough physical
             | force -- no matter how good of a lock you design, someone
             | can still kick down the door, or cut through it, or blow it
             | up. But with computer systems, assuming you don't have
             | physical access, an attack is only possible as a result of
             | a mistake on part of the programmers. Practically speaking,
             | there's no difference between writing an out-of-bounds
             | array access that BSoD's millions of computers, and writing
             | an out-of-bounds array access that opens millions of
             | computers to a zero-day RCE, and the company should not be
             | shielded from blame for their mistake only in the latter
             | case because there's an "attacker" to point fingers at.
             | 
             | Over the past few years of seeing constant security
             | breaches, always as the result of gross negligence on the
             | part of a company -- and seeing those companies get away
             | scot free because they were just innocent "victims of a
             | cyberattack", I've become convinced that the only way
             | executives will care to invest in security is if
             | vulnerabilities come with bankrupt-your-company levels of
             | liability.
             | 
             | Right now, the costs of a catastrophic mistake are borne by
             | the true victims -- the innocent customer who had their
             | data leaked or their computer crashed. Those costs should
             | be born by the entity who made the mistake, and had the
             | power to avoid it by investing in code quality, validating
             | their inputs, using memory-safe languages, testing and
             | reviewing their code, etc.
             | 
             | Yes, we can't just all write bug-free code, and holding
             | companies accountable won't just stop security
             | vulnerabilities overnight. But there's a ton of room for
             | improvement, and with how much we rely on computers for our
             | daily lives now, I'd rather live in a world where corporate
             | executives tell their teams "you need to write this
             | software in Rust because we'll get a huge discount on our
             | liability insurance." It won't be a perfect world, but it'd
             | be a huge improvement over this insane wild west status quo
             | we have right now.
        
           | btilly wrote:
           | The other side of it is this. By law, a licensed civil
           | engineer must sign off on a civil engineering project. When
           | doing so, the engineer takes personal legal liability. But
           | the fact that the company needs an engineer to take
           | responsibility means that if management tries to cut too many
           | corners, the engineer can tell them to take a hike until they
           | are willing to do it properly.
           | 
           | Both sides have to go together. You have to put authority and
           | responsibility together. In the end, we won't get better
           | software unless programmers are given both authority AND
           | responsibility. Right now programmers are given neither. If
           | one programmer says no, they are just fired for another one
           | who will say yes. Management finds one-sided disclaimers of
           | liability to be cheaper than security. And this is not likely
           | to change any time soon.
           | 
           | Unfortunately the way that these things get changed is that
           | politicians get involved. And let me tell you, whatever
           | solution they come up with is going to be worse for everyone
           | than what we have now. It won't be until several rounds of
           | disaster that there's a chance of getting an actually
           | workable solution.
        
           | exe34 wrote:
           | did they take basic precautions like staged releases, code
           | reviews, integration tests?
           | 
           | if not, then it's literally the engineer equivalent of gross
           | negligence and they do deserve to be sued to oblivion.
        
           | NegativeK wrote:
           | Doctors, engineers, and lawyers aren't infinitely accountable
           | to their equivalent of bugs. Structures still fail, patients
           | die, and lawyers lose cases despite the reality of the crime.
           | 
           | But they're liable when they fuck up beyond what their
           | industry decides is acceptable. If Crowdstrike really wasn't
           | testing the final build of their configuration files at all,
           | then yeah -- that's obviously negligent given the potential
           | impact and lack of customer ability to do staged rollouts.
           | But if a software company has a bug that wasn't caught
           | because they can't solve the halting problem, then no
           | professional review board should fault the license holder.
           | 
           | > we first have to find a way to separate innocent run-of-
           | the-mill mistakes from gross negligence - and that's going to
           | be extremely hard to formalize.
           | 
           | I think we just (oh god -- no sentence with a just is
           | actually that easy) need to actually look at other
           | professional licenses to learn how their processes work.
           | Because they've managed to incorporate humans analyzing
           | situations where you can't have perfect information into a
           | real process.
           | 
           | But I don't think any of this will happen while software is
           | still making absolute shit loads of money.
        
           | spott wrote:
           | This is less complicated than you think.
           | 
           | Civil engineering rules, safety margins and procedures have
           | been established through the years as people died from their
           | absence. The practice of civil engineering is arguably
           | millennia old.
           | 
           | Software is too new to have the same lessons learned and
           | enacted into law.
           | 
           | The problem isn't that software doesn't _have_ the kind of
           | practices and procedures that would prevent these kinds of
           | errors, (see the space shuttle code for example), it is that
           | we haven't formalized their application into law, and the
           | "terms of service" that protects software makers has so far
           | prevented legal case law from ensuring liability if you don't
           | use them.
           | 
           | Software engineering, compared to other engineering
           | disciplines, has had a massive effect on the world in an
           | incredibly short amount of time.
        
           | TeMPOraL wrote:
           | > _Nothing is ever designed to its absolute limit, and
           | everything is built with a healthy safety margin. You
           | calculate a bridge to carry bumper-to-bumper freight traffic,
           | during a hurricane, when an earthquake hits - and then add
           | 20%. Not entirely sure about whether a beam can handle it?
           | Just size it up! Suddenly it 's a lot less critical for your
           | calculations to be exactly accurate_
           | 
           | That may have been true a couple hundred years ago. It's not
           | been true for a couple decades now, because _budget_ became a
           | constraint even more important than _physics_ , and believe
           | it or not, you will have to justify every dollar that goes
           | into your safety margin. That's where the accuracy of modern
           | techniques matter: the more accurate your calculations (and
           | the more consistent inputs and processes builders employ),
           | the less material you can use to get even closer to the
           | designed safety margin. Accidentally making a bridge too safe
           | means setting money on fire, and we can't have that.
           | 
           | That's the curse of progress. Better tools and techniques
           | should allow to get more value - efficiency, safety, utility
           | - for the same effort. Unfortunately, economic pressure makes
           | companies opt for getting same or less[0] value for less
           | effort. Civil engineering suffers from this just as much as
           | software engineering does.
           | 
           | --
           | 
           | [0] - Eventually asymptotically approaching the minimum legal
           | quality standard.
        
           | bsaul wrote:
           | I like the analogy. What would the equivalent of << adding
           | safety margins >> to a piece of critical code ? Building
           | three of them with different technologies and making sure all
           | return the same results ?
        
         | wannacboatmovie wrote:
         | > Is there any path for software engineers to reach this level
         | of accountability and norms
         | 
         | Potentially controversial stance here, but most software
         | engineers are not engineers. They study computer science, which
         | doesn't include coursework on engineering ethics among other
         | things. I would say that by design they are less prepared to
         | make ethical decisions and take conservative approaches.
         | 
         | Imagine if civil engineers had EULAs for their products. "This
         | bridge has no warranty, implied or otherwise. Cross this bridge
         | AT YOUR OWN RISK. This bridge shall not be used for anything
         | safety critical etc."
        
         | lupire wrote:
         | How many bridges, would you say, does the average civil
         | engineering firm deliver each year, each on only 1 day notice,
         | in response to a surprise change in requirements due to a newly
         | developed adversarial attack?
         | 
         | Crowdstrike does this constantly.
         | 
         | You could demand the same level of assurance from software, but
         | in exchange, you don't get to fly, because the capacity won't
         | be there
        
         | dakiol wrote:
         | > I appreciate that we're finding the humour in this
         | catastrophe but what about the question of liability?
         | 
         | One of the biggest and most used piece of software (the Linux
         | kernel) comes with zero warranties. It can fail, and no one
         | would be liable. Are we fine with that? Is the CS case
         | different because it costs money? From an user perspective we
         | don't want software failing in the middle of an airplane
         | landing, so whether the software comes from CS or github, it's
         | of lesser importance.
        
         | guax wrote:
         | I would find it more useful if liability here we're attributed
         | to the need to purchase such draconian tools. Certifications
         | that require it and C levels who approve it. We would be better
         | by it.
        
         | maccard wrote:
         | I completely agree. When I've negotiated contracts for my
         | workplace, and we explicitly write in the contract that the
         | vendor is responsible for XYZ, it is my understanding (and
         | confirmed by legal, multiple times) that this means in case of
         | XYZ going wrong, they are _liable_ for up to the amount in the
         | SLA, however that isn 't a cap on liability in extenuating
         | circumstances.
         | 
         | If this all gets brushed away, it significantly devalues the
         | "well we pay $VENDOR to manage our user data, it's on them if
         | they store it incorrectly" proposition, which would absolutely
         | cause us to renegotiate.
        
       | omoikane wrote:
       | Previous Pwnie Award winners for comparison:
       | 
       | https://en.wikipedia.org/wiki/Pwnie_Awards
        
       | xyst wrote:
       | This comes across as incredibly tone deaf. People suffered
       | degraded medical care, billions lost in the airline industry,
       | billions more lost in productivity, and ultimately its time that
       | people cannot get back. Yet these clowns are accepting joke
       | awards as if this is something to hang on your trophy wall.
       | 
       | This is actually a c-level executive at ClownStrike, by the way.
       | 
       | > Michael Sentonas serves as President and is responsible for
       | CrowdStrike's product and go-to-market functions, including its
       | sales, marketing, product & engineering, threat intelligence,
       | privacy & policy, corporate development, corporate strategy and
       | CTO teams
       | 
       | https://www.crowdstrike.com/about-crowdstrike/executive-team...
       | 
       | The whole C-level executive suite at ClownStrike needs to go.
       | This company needs a real CTO like Jeremy Rowley. Although I
       | suspect a good person like him would never join the ranks of
       | ClownStrike
        
         | sigmoid10 wrote:
         | Well, this is the second time their CEO caused a major outage
         | by pushing a flawed update for a security product. This whole
         | thing is probably a joke to him.
        
         | hn_throwaway_99 wrote:
         | Did people actually watch the video??? I just don't understand
         | how they think Michael Sentonas was making a joke of all this.
         | If anything, he was acknowledging the horrible outcome of what
         | happened.
         | 
         | I don't think this absolves CrowdStrike of responsibility at
         | all, but what would you like him to do, commit harikari on
         | stage?
        
           | xyst wrote:
           | Clearly, step down. Including CEO (George Kurtz)
           | 
           | The shit rolls down hill, starting from the c-suite. These
           | clowns clearly cannot change the org and are blind to the
           | issues. Keeping the same leadership means nothing will
           | change. The fact that they even poke their head up for what
           | is clearly a marketing/PR stunt without showing any substance
           | shows how clueless they are.
           | 
           | Guy has "20 years" of experience which clearly doesn't amount
           | to shit. Maybe 20 years of junior experience and falling
           | upwards.
        
           | lupire wrote:
           | People who write "ClownStrike" aren't contributing to
           | discourse. Downvote and move on
        
             | mindslight wrote:
             | Yeah, the event was very clearly a crowd stroke.
        
           | mvdtnz wrote:
           | I watched the video. I saw this asshole executive with a huge
           | shit eating grin on his face the entire time he gave his PR-
           | managed speech and lapped up the applause of perhaps the
           | stupidest audience in tech history.
        
       | textlapse wrote:
       | This may end up in one of those court evidence videos or lawsuits
       | - this isn't a funny thing.
       | 
       | This would have been a closed moment (just a bunch of security
       | nerds discussing something) but instead this is now freely
       | available for the wider general public who had major grievances
       | to lampoon them.
        
         | hn_throwaway_99 wrote:
         | > This may end up in one of those court evidence videos or
         | lawsuits - this isn't a funny thing.
         | 
         | I didn't take the CrowdStrike's executive as making light of
         | the situation, at all. If anything, I thought his speech took
         | it seriously, acknowledged it was a major, major fuckup, and
         | basically said he was accepting the trophy as a mark of shame
         | and as a cautionary tale for future CrowdStrike employees.
         | 
         | I thought the exec accepting this was a true class act (to
         | emphasize, saying that in no way should imply that I think it
         | absolves CrowdStrike of responsibility, or liability, for what
         | happened).
        
           | textlapse wrote:
           | Context is everything. They had every chance to own up from
           | the day of until now. A 'lulz haha we goofed up' in a nerdy
           | security conference doesn't seem like the right place or
           | time.
        
             | ttymck wrote:
             | I'm not sure what your definition of "own up to it" is, but
             | they issued an apology day-of.
        
               | xyst wrote:
               | Apologies don't mean anything from a c-level suit (George
               | Kurtz) that has known history of causing outages. The
               | culture at crowdstrike of being accountable is a facade.
        
               | ttymck wrote:
               | Got it so to own up to it that have to change the
               | culture... Overnight?
        
         | ncr100 wrote:
         | Can make it funny, via a T-shirt:
         | 
         | When I use REGEXP I use it in my KERNEL CODE
         | 
         | Tragedy and comedy, same coin...
        
       | Brett_Riverboat wrote:
       | I work in IT and I happened to be the poor bastard on call when
       | Clown Strike took out the majority of infrastructure. If it
       | wasn't for my own personal refusal to use cloud based bullshit we
       | would have probably been down for days instead of hours. The fact
       | that people like my IT director saw nothing wrong with this and
       | is taking 0 steps to negate such bullshit makes me quite worried
       | that I will soon have to deal with some other catastrophic cloud
       | based failure in the near future.
       | 
       | I keep repeating ad-nauseam "only idiots rely on other peoples
       | computers" And I stand behind that statement 100%
        
         | xyst wrote:
         | Can only do so much when idiot CTOs take their advice from CTO
         | summits, consultants with their own perverse incentives, and of
         | course random conferences
        
         | system2 wrote:
         | I 100% agree. Additionally, I am amazed to see that people can
         | pay outrageous fees for cloud services such as Azure VD. For
         | the fraction of the yearly cloud budget, companies can create
         | crazy stable, offline-capable infrastructure themselves.
        
       | aa_is_op wrote:
       | They weren't even nominated, so this is such an epic failure they
       | won it as a late entry.
       | 
       | Also, that pony isn't typically super-glued to that structure, so
       | this was also a special trophy! :)))))))))
        
       | fredgrott wrote:
       | No, the most epic fail is still held by Boeing...they launched an
       | alpha capsule to ISS and still cannot get the astronauts back to
       | Earth...
        
       | swarnie wrote:
       | Glad you find it funny Chaps, forwarding this to my legal dept.
        
       | addicted wrote:
       | The only reason this could be funny is because the software
       | industry has found a way to excuse itself from any liability.
       | 
       | There is no other industry where someone could cause so much
       | damage and laugh about it. Least of all because the liability
       | itself would have led to its collapse.
       | 
       | Can you imagine a company hired to reinforce a bridge to protect
       | it from damage from a ship instead causes its collapse.
       | 
       | How long is that company gonna last? Even if no one dies or is
       | injured it will be run out of business.
       | 
       | Only in Tech can such a company not only survive but laugh about
       | it.
       | 
       | And that's even before we get to how amateurish the mistake these
       | guys made was.
        
         | xyst wrote:
         | 100% agree. As mentioned in another post, the acceptance of
         | this joke award is completely tone deaf.
         | 
         | Hospitals, banks, airlines, governments, and of course various
         | IT operations at companies that are forced to use this endpoint
         | security crap and Windows were impacted. Many people suffered
         | degraded quality of care at medical facilities. Surgeons losing
         | access to critical imaging/labs during surgery. Probably many
         | canceled and rescheduled surgeries as well.
         | 
         | People's flights were delayed or canceled. Imagine having to
         | take a last minute flight to visit a loved one on their death
         | bed only to get canceled because ClownStrike shit and
         | incompetent IT departments/CTOs fucked them over.
         | 
         | Many people/businesses unable to access critical banking
         | services.
         | 
         | Then the amount of lost productivity for office workers. Many
         | hours lost for IT folks, often even working into the weekends.
         | Time lost to dealing with ClownStrike bullshit when that time
         | could have been spent with their families and friends.
         | 
         | Fuck ClownStrike, George Kurtz, and this latest clown, Michael
         | Sentonas
        
         | vasco wrote:
         | The time to take yourself seriously is before the stuff
         | happens. Being stuffy now doesn't add anything. Accepting the
         | award means they have something to show every single new hire
         | and everyone in that office will have a physical reminder to do
         | better in the future.
         | 
         | I get the other points about consequences, but I don't think
         | accepting this award is in anyway problematic. It's one of
         | those things that I expect only people that care about
         | "appearances" would complain about.
        
           | cnasc wrote:
           | I agree. They show up, cop to it, and collect a memento mori
           | that will hopefully help motivate improvement in the future.
           | They have a lot of work to do to repair their reputation, and
           | I don't think they're foolish enough to think that this is
           | anything more than a small step on a long path.
        
           | bb88 wrote:
           | Ever had someone make a mistake that cost you time or money
           | and then tried to laugh it off as no big deal? That's what
           | this feels like.
           | 
           | The security industry needs to grow up.
           | 
           | The best thing they should have done is fire the CEO,
           | apologized profusely, and then use their army of sales people
           | to help make things right on a one on one basis with their
           | customers.
        
           | bootlooped wrote:
           | A less charitable way to look at it is that they weren't
           | taking things seriously before the incident, and they're
           | still not taking things seriously now.
           | 
           | What the most appropriate way to view it is, I don't know. I
           | think I'd need to know way more than I do about Crowdstrike
           | leadership.
        
             | evilduck wrote:
             | This wasn't their first serious blunder this year even,
             | just the most damaging and visible. The nature of their
             | mistakes seem to be exceedingly preventable too, with them
             | failing at textbook SRE practices. Their CEO has now been
             | at the helm of two different companies that have had
             | similar problems under his leadership. The evidence keeps
             | piling up and people want to keep making excuses for
             | negligent behaviors. Why should we excuse facts for
             | hypotheticals?
        
         | Aardwolf wrote:
         | On the other hand (maybe I'm just playing devil's advocate
         | here): nobody died (I hope at least! It's possible if some
         | hospital equipment, 911 calls, ... failed...) from this
         | incident despite being such huge scale that almost everyone
         | knows about it. It's almost as if humanity can be... fine...
         | when all this computing equipment fails.
        
           | evilduck wrote:
           | Then what value do they provide?
        
           | joe_the_user wrote:
           | Many hospitals, including emergency rooms, were shutdown.
           | Maybe no single death can be directly tied to the event but
           | I'm pretty this effectively resulted in greater death.
           | 
           | Maybe some of those inconvenience had to time stop and
           | contemplate the world but there are parts of the world where
           | computers stopping don't leave people just fine.
        
             | jcims wrote:
             | Agreed and I'm sure there are tons of anecdotesb just in
             | this community. My daughter for example is a night shift
             | labor and delivery nurse at a level three metro hospital.
             | They were _heavily_ impacted. All of the phones were down,
             | all of their internal messaging was down, translation
             | services are down, it was a rough couple of nights.
             | 
             | I don't have any direct experience with crowdstrike, but in
             | my experience with security vendors in particular, they
             | make it very difficult for customers to inject useful
             | change management into the process. I've been in infosec
             | for nearly thirty years and "my people" also need to
             | shoulder some of the blame for catastrophizing delays in
             | delivery of updates to preventative and detective controls.
             | I've always known this but spending the last year 'outside'
             | in central platform delivery and operations for a large
             | financial has really brought that to light. Fortunately I
             | know how to speak security so it helps us navigate but many
             | aren't so fortunate.
        
           | allendoerfer wrote:
           | Stopping air travel has probably canceled a lot of
           | unnecessary meetings and slowed down global warming.
           | 
           | Maybe events like this provide value in that they indentify
           | which systems are actually mission critical.
        
             | stavros wrote:
             | It also probably caused a lot of people to not be able to
             | say goodbye to their loved ones, or miss their holiday, or
             | whatnot. People don't travel exclusively for frivolous
             | reasons.
        
               | allendoerfer wrote:
               | I am not suggesting that airlines should see their
               | operations as non-critical (and let a third party make
               | arbitrary untested updates to their critical systems).
               | 
               | But maybe some organizations using air travel can learn
               | from this. I am still hoping that the pandemic will have
               | had some lasting positive effects (on top of all the pain
               | it has caused).
        
         | mrinfinitiesx wrote:
         | Fuck up the world's computers, piss off all of its IT teams,
         | and then send people $10 uber eats gift cards as if that'll get
         | you anything, maybe a coke at best.. but its further admitting
         | fault. That's like, a tip. Like here, have a sandwich while you
         | fix our fuckup.
         | 
         | They don't care. They'll all get 6 figure bonuses too in
         | management for 'weathering the storm' after the mishap and
         | probably get more money because look what they can withstand,
         | literally technology-murder and get away with it.
         | 
         | It's almost movie-grade evil villainy tier stuff lol
        
           | trhway wrote:
           | Because people on the receiving end are the same - they
           | accepted and rolled out the update without even as much as
           | "canarying" it. SolarWind was the same - the customers
           | weren't bothered even by mismatched integrity hashes. It is a
           | tacit pact in our industry - we all screw up and cut the
           | slack to each other. Who will cast the first stone?
        
             | shrubble wrote:
             | Crowdstrike can force-push an update at any time of their
             | choosing that the connected device will grab and load, is
             | my understanding.
        
               | trhway wrote:
               | Don't you see that you're only enforcing my point?
        
               | shrubble wrote:
               | No, because "canary" in the context that you used it, has
               | a specific meaning. If you believe they should have
               | CrowdStrike more or been more skeptical of their claims
               | before licensing, that's independent of the
               | user/administrators doing canary-style testing.
        
             | miguelazo wrote:
             | What's the default? And what did their technical account
             | manager recommend? My guess, no canary ring.
        
             | yjftsjthsd-h wrote:
             | > they accepted and rolled out the update without even as
             | much as "canarying" it.
             | 
             | Well, no; AIUI part of the problem was precisely that this
             | update was pushed in such a way that it skipped any canary
             | system in place. There might be a separate conversation to
             | question what percentage of their users were taking
             | advantage of its staged rollout features, but it's rather
             | immaterial when the incident in question bypassed them even
             | if users had configured it sensibly.
        
               | sisve wrote:
               | But the customer installed CS software could do this. So
               | they are partly to blame. I do not think you will find
               | that tesla would allow a third party update to its car.
               | Or a oil rig would allow third party updates to critical
               | parts of its systems. So its understanding the context. I
               | think a lot of places this is an risk that is ok. But
               | maybe not everywhere. And I hope some companies with
               | critical systems will learn from this
        
           | bitexploder wrote:
           | Honest question, what should they do? Uninstall the company
           | and give up? Ignoring their actual response, what is a good
           | response to this?
        
             | gleenn wrote:
             | If my company causes billions in damages and endangers
             | human lives, I can't imagine why my company isn't
             | bankrupted and dissolved.
        
               | IAmGraydon wrote:
               | Ok, but the market makes that decision, not the company.
               | Crowdstrike has no choice but to accept the sentence the
               | market hands it. It's just that the market appears to
               | have sentenced it to...barely anything. Blame those still
               | using CrowdStrike after this incident.
        
               | xenocratus wrote:
               | If your company causes damage at society-scale (hell,
               | even if it does major damage to one person's life), the
               | state should be ready to intervene and make the company
               | pay the tab for the damage they caused? Like, that
               | doesn't sound very controversial.
        
               | sb8244 wrote:
               | Yea. Their contracts likely have clauses for all of that.
               | I say likely, but we already know this is true because
               | it's come out.
               | 
               | The thing is, crowdstrike isn't the only incompetent
               | party here. Many major companies (looking at Delta)
               | probably made it worse for themselves with a very poor
               | response after.
               | 
               | So should crowdstrike pay beyond a reasonable measure
               | because of Delta's poor response?
        
               | eftychis wrote:
               | No contract clause can protect you from a gross
               | negligence tort.
               | 
               | (Or equivalent in one's respective civil law system.)
               | 
               | This might be the easiest gross negligence tort case to
               | show and litigate-- still hard but if everyone starts the
               | lawsuits they can not pull the contract to protect them.
               | They will try of course and they will fail in most but
               | the obvious cases.
               | 
               | What you can not sue them for is not forseeable damages
               | -- e.g. I lost my dream job because the computer died
               | during the interview. But ceasing operations of a company
               | is generally fair game. And plaintiffs can argue that no
               | reasonable person could forsee and mitigate against this
               | disaster so the failure is not due to plaintiff's "fault"
               | negligence.
        
               | akira2501 wrote:
               | > Blame those still using CrowdStrike after this
               | incident.
               | 
               | I think you'd have to ask "why are they still required to
               | use CrowdStrike or any AV provider?" I think once you
               | find the answers to these questions you realize this is
               | not a properly functioning product market.
               | 
               | How you can then build a publicly traded company on the
               | back of a complete and total lie is another subject, but
               | it's certainly also implicated in the above questions.
        
               | lesam wrote:
               | Actually generally the legal system would decide that,
               | not "the market".
               | 
               | I.e. investors have assigned roughly zero probability to
               | CrowdStrike bearing the full cost of this incident, and
               | set the market price accordingly.
        
               | Timber-6539 wrote:
               | The market as a tool for punishing bad players is far
               | from perfect. It's why we still have monopolies and see
               | consumer antitrusts and other similar legal suits in
               | court. Advocating for shifting blame to customers still
               | using Crowdstrike is ignorant of the problem and further
               | signals a dishonest approach to the issue at hand.
        
             | andy81 wrote:
             | The company should be fined so heavily that they become a
             | goverment asset.
             | 
             | With current shareholders wiped out entirely, it should
             | then be re-listed.
        
               | amluto wrote:
               | IMO the company that this should have happened to is
               | PG&E. I think California could have forced them into
               | liquidation and bought their assets. No bailout required,
               | complete loss for shareholders, and CA could potentially
               | have fixed much of its disastrous utility situation at a
               | reasonable price.
               | 
               | A company-ending fine or judgment against Crowdstrike
               | wouldn't come with any great reason for a public takeover
               | -- Crowdstrike could cease to exist and the overall
               | ecosystem would be fine.
        
               | hansvm wrote:
               | Outside of Alaska and Wyoming, Silicon Valley has the
               | worst power and internet of anywhere I've ever lived
               | (worse than AR, MN, and ND by a longshot), measured
               | either in incremental cost or uptime/availability. The
               | fact that PGE keeps requesting additional rate increases
               | "for fire safety" and immediately kicks those back to
               | shareholders isn't a great look either.
        
             | wiseowise wrote:
             | Hide themselves from the face of the world for at least 5
             | years until people somewhat forget about them.
        
           | mywacaday wrote:
           | Crowdstrike should be held accountable but so should any
           | reasonably sized enterprise that allows code to be pushed to
           | their whole enterprise without testing. All the large
           | enterprises I've worked for required Windows patches to be
           | tested before being pushed to production why are crowdstrike
           | updates treated differently?
        
             | __turbobrew__ wrote:
             | It clearly states in the post mortem that rapid response
             | updates were pushed globally without any say from the
             | customer: https://www.crowdstrike.com/wp-
             | content/uploads/2024/08/Chann...
        
             | HeatrayEnjoyer wrote:
             | Given the cybersecurity landscape it is not unusual for
             | security software updates to be pushed globally without the
             | option to test or even stagger them. When a potent new
             | vulnerability becomes public knowledge (or semi-insider
             | knowledge) and especially if there's already a PoC
             | available, organizations only have minutes to a few hours
             | before threat actors begin utilizing it.
             | 
             | APTs and organized crime groups have 24/7 staff to
             | weaponize and integrate new vulnerabilities into their
             | workflow as rapidly as possible, or have other contracted
             | other groups to provide this service.
        
         | delusional wrote:
         | I don't think this is all that accurate. In the engineering
         | space, Boeing has so far accepted responsibility for two fatal
         | crashes and the fucking door falling out of an airplane and is
         | still in business.
        
         | spacechild1 wrote:
         | To add insult to the injury, these people call themselves
         | "software engineers".
        
           | codetrotter wrote:
           | There is sparsely little real "engineering" that goes on in
           | the field of "software engineering", industry wide, in terms
           | of ensuring that our software is reliable and secure.
           | Performance and development velocity seem to take the driver
           | seat always, in a whole lot of software.
           | 
           | See also this talk by Bryan Cantrill, "Scale by the Bay 2018:
           | Rust and Other Interesting Things"
           | https://youtu.be/2wZ1pCpJUIM where he talks about software
           | platform values, in the sense of what different programming
           | languages and other things focus on. He also touches on the
           | fact that while higher level layers in the stack might value
           | security it kind of falls apart when the very microcode in
           | our CPUs sacrifices security for performance.
           | 
           | This was in a period of time where Spectre https://en.m.wikip
           | edia.org/wiki/Spectre_(security_vulnerabil... and Meltdown ht
           | tps://en.m.wikipedia.org/wiki/Meltdown_(security_vulnerabi...
           | had reared their ugly heads.
        
             | blablabla123 wrote:
             | > There is sparsely little real "engineering" that goes on
             | in the field of "software engineering", industry wide
             | 
             | There surely is actual engineering but it's scattered
             | unevenly across companies. It's funny that Crowdstrike did
             | fuzz their code but didn't even check for correct arity. I
             | think that the Cybersecurity industry isn't such a strong
             | adopter of sophisticated engineering techniques as for
             | instance in Web development where new testing techniques
             | evolve every few years.
        
               | jrockway wrote:
               | I really don't think that's true. All software is
               | undertested and it's likely that there isn't a
               | significant differences between web apps and security
               | apps.
               | 
               | Having said that, writing ring 0 drivers an unsafe
               | language sounds like an invitation to disaster. That's
               | what went wrong with CrowdStrike. You don't need any
               | testing to avoid crashing the OS when given a bad virus
               | definition file. (Making the virus definition file do
               | something useful... sure, you're gonna need tests for
               | that.)
        
         | wayeq wrote:
         | Statistically speaking it seems likely people really did die
         | from this mistake, if only indirectly due to for example delays
         | in medical care caused by the outage.
        
           | gleenn wrote:
           | It would be hard to imagine it didn't: https://www.washington
           | post.com/business/2024/07/19/windows-o...
        
         | thayne wrote:
         | So, you would prefer that they don't accept this "award", and
         | in so doing admit that they messed up?
         | 
         | And honestly, crowdstrike is _more_ likely to go under than a
         | company that failed to re-inforce a bridge. Their mistake
         | caused measurable harm to many well funded companies that have
         | the resources to sue crowdstrike in court.
         | 
         | If crowdstrike survives, it will be because there isn't a lot
         | of competition in their market, not because they can excuse
         | themselves of liability.
        
           | ospray wrote:
           | I would have liked to see Crowdstrikes legal councils face as
           | they accepted this award. There is no way they ran it by
           | them.
        
         | lispisok wrote:
         | We've professionalized industries like engineering and medicine
         | because incompetent practitioners are a threat to public health
         | and safety. Software is now in everything and incompetent
         | practitioners have been a threat to public health and safety
         | for a long time now yet we do nothing about it.
        
           | Onavo wrote:
           | Found the gatekeeper
        
             | wiseowise wrote:
             | Make sure to pick a surgeon from the street next time
             | you'll need an operation. Don't want to gatekeep the
             | profession, after all.
        
             | ThrowawayR2 wrote:
             | Crowdstrike and countless other software failures before it
             | proves that the gates need to be kept. The only question is
             | whether we start doing our own gatekeeping or it eventually
             | gets forced on us by heavy handed legislation like it was
             | for doctors and civil engineers.
        
           | scott_w wrote:
           | In construction, Grenfell happened and witnesses demanded
           | immunity from prosecution to testify, because they knew
           | they'd broken numerous laws in its construction and
           | certification. Residents at similar buildings are the ones
           | paying to make them safe for habitation, not the crooks that
           | built them. Professionalisation is not a magic bullet.
        
           | robocat wrote:
           | Blaming individuals when systems fail: does it work reliably?
           | 
           | And how can certification work across borders between
           | jurisdictions?
           | 
           | I've seen a fair share of engineering disasters in my own
           | developed country where a few signatures by engineers didn't
           | prevent the causes.
           | 
           | Regulations and jail doesn't seem to be enough of a
           | disincentive? How do you force someone to do a good job?
           | 
           | Open source is not very compatible with certification.
           | 
           | Certification either (1) makes all software proprietary or
           | (2) requires people to sign that particular open source
           | software is safe or (3) maybe we should disallow the
           | liability evasion clauses of open source software licenses?
        
           | zvmaz wrote:
           | As if "professionalized industries" like engineering and
           | medicine don't ever commit mistakes.
        
         | Onavo wrote:
         | Wait till you learn about finance, or oil and gas, or mining,
         | or countless other legacy industries that quietly run America
         | since the Rockefeller days. Many parts of Texas lost power for
         | weeks due to Beryl and all the power companies got was a slap
         | on the wrist (despite being explicitly warned about this
         | scenario many times).
        
           | scott_w wrote:
           | Hell look at Grenfell in London! 72 people died and the
           | people that designed it wanted immunity from prosecution to
           | testify at the inquiry! Similar buildings are charging the
           | cost of upgrading the cladding to residents instead of doing
           | the right thing and eating the cost themselves.
        
           | robocat wrote:
           | Companies are too easy a target...
           | 
           | What were the regulatory incentives? Was the electricity
           | market designed to encourage resiliency?
           | 
           | There was a systematic fault - it needed a collective
           | solution not one that relies on individual companies doing
           | the right thing???
        
         | lapphi wrote:
         | I can think of at least one industry where the price of failure
         | is almost always borne by the users and not the companies. Very
         | closely integrated with tech as well.
        
         | booleandilemma wrote:
         | It just illustrates how low the stakes are in tech really.
        
         | boxed wrote:
         | This attitude is why we have a culture of fear and do-nothings.
        
       | maxlin wrote:
       | This shows great grit and ownership. Props
        
       | hartator wrote:
       | So 911 not working in several cities and hospitals flows being
       | slow down to an halt, and they have time to go to defcon for a
       | joke?
        
         | mminer237 wrote:
         | Are there hospitals that haven't fixed their computers yet?
         | Obviously CS messed up, but aside from paying for damages and
         | making process changes, I'm not sure what else they can do at
         | this time. Warning people to not repeat their mistakes doesn't
         | seem like a bad use of time.
        
       | thedougd wrote:
       | They understand who's buying their product. It's not the
       | information security teams who cleaned up this mess, but rather
       | the operations and end user compute teams.
        
       | mikeweiss wrote:
       | I'm wondering how on earth has the CEO and CTO managed to keep
       | their jobs after this fiasco?
        
       | skirge wrote:
       | Serious companies should have better QA. This includes
       | Crowdstrike customers.
        
       | badgersnake wrote:
       | It took our IT department until Monday afternoon after to put out
       | a message reaffirming their confidence in crowdstrike. Before any
       | postmortem on their side or ours. I'm guessing they got offered a
       | big discount to renew.
       | 
       | My IT team have a lot more confidence in crowdstrike than I have
       | in them.
        
       | Aerbil313 wrote:
       | Never in a hundred years I'd expect to see the CEO of Crowdstrike
       | at Defcon. The two are the two extremes on a spectrum of
       | corporate.
        
       | ein0p wrote:
       | That seems unwise and tone deaf - to laugh it up on stage after
       | causing easily tens of billions of dollars in losses worldwide.
        
       | hypeatei wrote:
       | This issue goes beyond CrowdStrike and points to the general
       | approach to security that is buying products off the shelf to
       | satisfy regulators and insurers while not actually caring what it
       | does or how it works.
       | 
       | I'm not saying tech shouldn't be regulated, but our current model
       | of "buy this thing to shed liability" doesn't work. The worst
       | part is, the people who saw this coming (i.e. your IT department)
       | probably can't do a damn thing about it because it's mandated at
       | high levels in the company either for "cyber insurance"
       | requirements or some other regulation. Madness.
        
         | maccard wrote:
         | > The worst part is, the people who saw this coming (i.e. your
         | IT department) probably can't do a damn thing about it because
         | it's mandated at high levels in the company either for "cyber
         | insurance" requirements or some other regulation.
         | 
         | I've worked with many excellent IT people who feel this way,
         | but the vast majority of my experience with IT departments has
         | been that as long as the contract covers what it needs to, they
         | don't actually care if it solves the problem or not. At a
         | previous job, software similar to crowdstrike was installed on
         | my workstation over a weekend, and I came back to 20% slower
         | compile times (I was working on them at the time so I had
         | dozens of measurements). I had ETL traces showing the problem
         | was the software, but IT refused to acknowledge it because the
         | vendor contract said there was no performance impact expected
         | for our workload.
        
       ___________________________________________________________________
       (page generated 2024-08-11 23:00 UTC)