The Dangerous Flaw in Windows XP's 45 Million Lines of Code🎙Darknet Diaries Ep. 57: MS08-067

111,623
0
Published 2023-01-05
Microsoft gets BILLIONS of error reports from Windows users. So how do they figure out which ones are important? This is the story of how they discovered the Conficker Worm, the worst the world has ever seen.

Visit darknetdiaries.com/episode/57/ for a list of sources, full transcripts, and to listen to all episodes.

All Comments (21)
  • Windows XP sent off a crash report only if the user clicked yes? How quaint that Microsoft once respected the concept of consent!
  • @sammcewan3834
    I still can’t get over how great the name Brake Master Cylinder is. I always think of Curtis Blow as a mechanic.
  • @fakename6310
    Hi Jack! Huge fan of the show, I discovered you 6 months ago, and since then watched all episodes, you’ve made work a-lot more bearable :)
  • @amrozein8683
    Everyday, every single day i end my day listening to your podcast. These podcasts are music to my ears.
  • @snarevox
    i am in love with these thumbnails. i also have a thing for courtroom art, but i think i like these thumbnails even better.
  • @noranoxica
    I love your podcast. You've taken the rabbit hole, shone a light down it and "See I told you it's not that deep and it's also pretty cool .And it's not a rabbit hole at all, but the foundation of our modern world" and I love that.
  • @royrush5374
    New to this channel. Not computer savvy but mind blown none the less. I learn something new every few minutes watching these. I binge watched for a few hours last night. Subbed!
  • @James-wi9mg
    This channel will be at 1m subs by the end of the year easily. Keep up the great work man!
  • @FennecTECH
    A facility i lived in had a system full of (my) PII vulnerable to ms08-067 in 2021 and they refused to update it. This thing was used exclusively for email and printing documents. I fired up wannacry in a VM to force their hand. they asked me what i did. I said “you left a your computer vulnerable to an exploit that was patched in 2008 and a worm infected one of my test machines. They replaced that anemic XP machine straight out of 2012 with something running windows 10.
  • @notsam498
    So nostalgic. Some of these podcast on old security bring back some find memories. Thanks Jack!
  • @guens01
    I'm not gonna lie, this was my favorite vulnerability to exploit when it was new. I'm happy to hear a story about it from the Microsoft's side. It was juicy!
  • @redacted629
    I'm sure many could wrip holes in this podcast regards Microsoft but I'll let Microsoft do that with the millions of lines of closed source code.
  • @DEtchells
    These stories are so fascinating! Keep up the great work!
  • @egaxorz
    one thing to note about jack's commentary, is that he is talking from the perspective of a "novice" character, not himself, then occasionally breaks character and shows a fraction of his true knowledge before returning to both the character and neutral recap. he obviously knows more than what he lets on but obfuscates that for storytelling purposes. that is what makes the podcast so engaging.
  • @jchastain789
    Awesome story man. Loved that you had an actual ms engineer on . Fantastic
  • @EvilMmM
    dude i'm hooked on your videos... keep the good work up!!
  • @accesser
    Gret episode Jack As somebody who's team has to try and patch thousands of end point when this stuff happens, I can relate to much of it, great work by M$ behind the scenes to get patches out
  • Great channel , factual, deep and well thougt allround. Great mindset of narator. Love it.
  • @sammay1540
    You’re a fantastic storyteller. I’m hooked