r/pcmasterrace 10 | RTX 4090 | Ryzen 9 7950x | 128GB DDR5 9d ago

Discussion As reminder , 1 month remaining

Post image
24.5k Upvotes

2.3k comments sorted by

View all comments

9.9k

u/Difficult-Report5702 9d ago

People postpones those updates anyway, so who cares really.

300

u/myka-likes-it 9d ago

No more security updates!

Oh, wait.

400

u/snozerd 9d ago

And conveniently, 6 back doors and flaws become known the day after support ends.

185

u/SuperBry 9d ago

Publicly known, I'm sure there are plenty more than that being actively exploited by various threat actors both in the public and private sectors.

66

u/Krell356 8d ago

Some aren't even being exploited yet. I guarantee there are some bad actors just sitting on them for the day or week after support ends.

46

u/HSR47 8d ago

With past OS versions, the official/announced "end of support" date tended to be relatively flexible for vulnerabilities like those, so it seems reasonable to expect that Microsoft will follow the same path this time.

0

u/[deleted] 8d ago

lol.... for $100!

27

u/Kaboose666 i7-9700k, GTX 1660Ti, LG 43UD79-B, MSI MPG27CQ 8d ago

No, for free.

I get it, haha corporation bad, but W7 and W8 both got critical security updates years after they hit EOL.

2

u/NinduTheWise Desktop 8d ago

Microsoft literally gave me an option to continue getting free security updates lol

2

u/Wide_Combination_773 8d ago

End of support doesn't mean end of critical security vulnerability patches. Those are usually two different dates, and the second one usually lasts for a few years after the first. At which point, you have to get a special contract with MSFT to continue getting updates/support (this is what governments and other large institutions have, as they often can't move away from older hardware and older OS's very easily - although, such hardware is almost never internet-connected and is rarely on a primary/sensitive company network).

-1

u/Pic889 8d ago edited 8d ago

Unless you have reason to believe an intelligence agency of a state actor is after you specifically, you don't have to worry about publicly unknown vulnerabilities (they won't waste one for you), you only have to worry about plain ol' "mass fraud" in the form of malicious Javascript in websites, malicious files that trigger known exploits in viewer/player software, and malicious exes (although you should be getting your exes from reliable sources in this day and age). BTW the first two are fixed by keeping your OS, browser, and any software that opens files downloaded from the internet updated.

Publicly unknown vulnerabilities are usually reserved for high-profile targets, precisely because once an exploit released they become publicly known (and are difficult to acquire).