2/6/2026 at 2:32:51 AM
One good thing we can say about Linux bundling all the drivers is that it obviates the need to run almost all of this type of low quality (if not outright spyware) driver management software. They are especially problematic because they can't be sandboxed easily like most other proprietary crap.For whatever reason, distro maintainers working for free seem a lot more competent with security than billion dollar hardware vendors
by digiown
2/6/2026 at 2:56:16 AM
> For whatever reason, distro maintainers working for free seem a lot more competent with security than billion dollar hardware vendorsI don't believe that these billion dollar hardware vendors are really incompetent with security. It's rather that the distro maintainers do care quite a bit about security, while for these hardware vendors consider these security concerns to be of much smaller importance; for their business it is likely much more important to bring the next hardware generation to the market as fast as possible.
In other words: distro maintainers and hardware vendors are simply interested in very different things and thus prioritize things very differently.
by aleph_minus_one
2/6/2026 at 12:47:14 PM
Years of working in embedded computing have left me with the impression that most hardware companies are just bad at software. I think part of it is that the long cycle times of making hardware push them towards a culture of waterfall development. But years of working with the microcontroller libraries for ethernet PHYs, the bash scripts to build the kernels for SoCs, etc make me perfectly willing to believe they are incompetent with security.by Symmetry
2/6/2026 at 1:58:51 PM
And which are the companies that are good at software? Please, give at least one example.by M95D
2/6/2026 at 3:18:56 PM
Appleby hhh
2/6/2026 at 5:10:58 PM
Everyone's gonna give you shit for this answer and there's a hundred things I could tell you about their software that pisses me off, but the bar is so low for software these days, their stuff is still in the high end of quality (they need to do a lot to get back to where they were 10 years ago though)Only other software I regularly use that I think is overall high quality and I enjoy using are the JetBrains IDEs, and the Telegram mobile app (though the Premium upselling has gotten kinda gross the past few years)
by hbn
2/6/2026 at 3:43:58 PM
These days I use Apple hardware despite Apple’s software, not because of it.by cmcaleer
2/6/2026 at 5:27:00 PM
They at least were good at software. The argument that they currently still are good at software is getting weaker and weaker.by Telaneo
2/6/2026 at 3:26:00 PM
XCode and Tahoe beg to differ.by scns
2/6/2026 at 3:36:25 PM
Surely you jest, good Sir!by mring33621
2/6/2026 at 3:26:19 PM
used to be. they're becoming microslop 2.0by misir
2/6/2026 at 3:24:36 AM
Sure. New sales means new revenue. Maintenance and support is just overhead.It's shortsighted, but modern capitalism is more shortsighted than Mr. Magoo.
by da_chicken
2/6/2026 at 8:45:39 AM
It's a cost vs benefit. As long as the cost of such blatant violation of security principles doesn't outweight the benefit of focusing on something else, nothing is done.https://www.legalexaminer.com/lestaffer/legal/gm-recall-defe...
by lloeki
2/6/2026 at 9:54:36 AM
I don't buy it. It makes sense for a small company where the cost of fixing it might be noticed. But AMD generates some ~$30bn in annual revenues. How much of a developer's time does it take to change the code to use HTTPS? $1000? $5000? Let's be extreme and call it $10,000. That's 0.00003% of AMD's annual revenue. It's barely even a rounding error on their accounts.by jbstack
2/6/2026 at 10:13:07 AM
Because that's not how corporate maths works. The comparison is not "what is the cost of this vs our current revenue?" The calculation is "what could that engineer be doing instead and what is that worth vs fixing this issue?"Will fixing this issue bring in more revenue than ignoring it and building a new feature? Or fixing a different issue? If the answer is "no" then the answer is that it doesn't get fixed.
by scott_w
2/6/2026 at 2:52:12 PM
> The calculation is "what could that engineer be doing instead and what is that worth vs fixing this issue?"I don't agree with this, because it pre-supposes that there's a limited number of engineers available. The question isn't "shall I pull engineer X off project Y so that he can fix security bugs?", it's "shall I hire an additional engineer to fix security bugs?". The comment above mine suggests the answer to that question is "no, because it's too expensive to do that compared to just paying to clean up security breaches after they happen", which is what I was questioning in my first comment.
by jbstack
2/6/2026 at 4:10:44 PM
It doesn't matter: the equation is exactly the same. Why would you hire someone to work on a bug fix or security fix when you could hire that same person and have them work on something even more valuable again?by scott_w
2/6/2026 at 5:09:19 PM
Now there's a related problem in the premise: it pre-supposes that the company has an unlimited amount of valuable work to be done. If that were the case, all companies would simply expand their workforce as much as possible all the time, only constrained by money running out (which itself would be an exponential increase since "valuable" work presumably leads to more money in future). In reality, companies do not prioritise expansion above all else. In fact any time a company pays a dividend to its shareholders, or otherwise refrains from spending cash reserves on new hires, it's recognising that it cannot invest profits in an effective way into its labour force.When framed correctly (there's effectively an unlimited labour supply for most companies, and effectively a limited demand for staff) then the question becomes "shall we hire an engineer to fix security bugs when we don't need an engineer for anything else?".
by jbstack
2/6/2026 at 8:16:56 PM
> it pre-supposes that the company has an unlimited amount of valuable work to be done.In effect, there is, yes. At the very least, there’s more high value work that most companies can do than there are engineers to do said work. There’s a reason literally every leadership course teaches you how to say “no” over and over again.
by scott_w
2/6/2026 at 5:34:04 PM
ah corporate meff, if the claim is lower than the recall cost, pay the claimby lencastre
2/6/2026 at 8:18:06 PM
You can complain all you want about it but, unless you can push up the cost of the claim, that’s what corporations will do.by scott_w
2/6/2026 at 11:26:21 AM
First they have to hire a developer with knowledge of how to do this right, as they might not even have one. Which could easily eat 10k+ of dev time as hiring good people takes a lot of time.by dgoldstein0
2/6/2026 at 8:10:08 PM
You could probably take any user at random from this discussion alone and they'd have the knowledge needed to make the switch from http to https. I'm certain that AMD has all the knowledge they need right now, but even more certain that it wouldn't be hard to hire someone new who does as wellby autoexec
2/6/2026 at 2:54:31 PM
Ok, but this ultimately just comes down to a debate over the amount of the cost. The principle is the same. Even if we double or triple the cost, it's a drop in the ocean for a company like AMD.by jbstack
2/6/2026 at 10:42:06 AM
You don’t believe it? It took until the early 2000s for Microsoft to take security seriously and they were a money printing machine.by tw04
2/6/2026 at 2:49:06 PM
I didn't say I don't believe it happens. I'm saying I don't believe it's a based on a cost benefit analysis. I.e. that in a multi-billion dollar company someone consciously ran the numbers and decided "it's cheaper for us to pay to clean up the mess if there's a security breach than it is to hire someone to fix security bugs". The cost of the latter is too low for this kind of logic to make any sense.I think it's more realistic that in any sufficiently large company the bureaucracy is so unwieldy that sensible decisions become difficult to make and implement.
by jbstack
2/6/2026 at 9:23:10 PM
That was a brief chapter in Microsoft’s history. Satya Nadella stopped taking security seriously the day he got in.by bigfatkitten
2/6/2026 at 1:57:08 PM
This comes down to intentions versus results. Viewed through the lens of results the comment you're replying to is still correct: The result is incompetence. I'd argue that's the only lens that matters when you're on the receiving end of such work.by zeendo
2/6/2026 at 10:02:12 AM
Ryzen master isn't a driver. Most of its functionality isn't even available in Linux, even with 3rd party tools or drivers.by kasabali
2/6/2026 at 3:20:44 AM
Is the issue in the OP related to windows? this wasn't immediately clearby nextaccountic
2/6/2026 at 8:47:30 AM
Yes, because you would only run such an updater software on Windows.by pooper
2/6/2026 at 9:57:36 AM
Aren’t vendors moving to a browser-based control model, where the hardware runs on a local web server that exposes various settings? It sounds terrible for security.by xattt
2/6/2026 at 2:58:25 AM
It is, mostly, the organization Linus created (and of course the enormous number of people participating).An absurd amount of weight is carried by a small number of very influential people that can and want to just do a good job.
And a signal that they're the best is you don't see them in the news.
We need more very influential people who aren't newsworthy.
by colechristensen
2/6/2026 at 3:10:41 AM
The most direct comparison would be the package manager, that's why I said distros. These driver management tools do a (poor) job at being a package manager, along with many other commercial software installation tools.With Linux itself, it helps that they are working in public (whether volunteering or as a job), and you'd be sacked not in a closed-door meeting, but on LKML for everyone to see if you screw up this badly.
by digiown
2/6/2026 at 11:35:43 AM
Popular Linux distributions also use HTTP CDNs. Even though the content is always signed, it still exposes the HTTP stack, signature verification code and a bunch of the application logic to the attacker.Apt has had issues where captive portals corrupt things. GPG has had tons of vulnerabilities in signature verification (but to be fair here, Apt is being migrated to Sequoia, which is way better).
But these distros are still exposing a much larger attack surface compared to just a TLS stack.
by Avamander
2/6/2026 at 9:00:05 AM
You don't really need to run these updaters on windows.by Hikikomori
2/6/2026 at 1:25:48 PM
The corporate drones have the management tower above them, the OSS enthusiasts do not. That is it.by myst
2/6/2026 at 5:25:02 AM
Linux has had support loading kernel modules since 1995.by charcircuit
2/6/2026 at 10:48:09 AM
modprobe http://192.168.1.1/amdgpu.kolol
by bravetraveler