Nothing written here can possibly be correct.
markr
Everyone will be working multiple shitty service jobs that robots are not cost effective to automate. Our miserable wages will be just sufficient to keep the wheels on the cart from falling off.
Anything But The Guns.
That is almost entirely a myth. Yes, there are 'cross over votes' in states that don't have open primaries but facilitate party enrollment, but those cross over voters are almost always 'independent' voters who enroll and then unenroll and are not doing anything other than voting for the candidate of their choice in the primary that candidate is running in. So called 'strategic voting', as far as I know, has never made any difference in any presidential primary, but go ahead and bring up the bodies.
It’s our version of China’s social credit score.
The fact of the matter is that there is a 100% fatality rate for the set of people who have had even one mRNA vaccine. There is an identical fatality rate for the set of people who have had zero mRNA vaccines, but that isn't important.
Also I should mention the timespan for the fatality rate: 150 years, but I won't.
I read these threads for the butthurt responses from the muskovites. They never disappoint.
I’m in the road kill is vegan camp, so sure after Winnie croaks chow down.
There are a lot of misunderstandings about what happened. First, the ‘update’ was to a data file used by the crowdstrike kernel components (specifically ‘falcon’.) while this file has a ‘.sys’ name, it is not a driver, it provides threat definition data. It is read by the falcon driver(s), not loaded as an executable.
Microsoft doesn’t update this file, crowdstrike user mode services do that, and they do that very frequently as part of their real-time threat detection and mitigation.
The updates are essential. There is no opportunity for IT to manage or test these updates other than blocking them via external firewalls.
The falcon kernel components apparently do not protect against a corrupted data file, or the corruption in this case evaded that protection. This is such an obvious vulnerability that i am leaning toward a deliberate manipulation of the data file to exploit a discovered vulnerability in their handling of a malformed data file. I have no evidence for that other than resilience against malformed data input is very basic software engineering and crowdstrike is a very sophisticated system.
I’m more interested in how the file got corrupted before distribution.