Re: Would eBPF really have helped here?
While your valid but very generalized point covers the real issue that things like Crowdstrike jam their fingers deep into the guts of the host operating system, it leaves much out in the eBPF part of the article.
eBPF also provides a deep lens into the internal state of kernels that support it. It also has had a long legacy of problems, as it was yet another example of Lennart Poettering once again cowboy coding an under-planned and potentially dangerous new feature. It like much of his work, was slapped together, poorly architected, and promptly produced the security and stability problems people warned him about from when he publicly announced what he was working on. Setting aside that the actual eBPF implementation is incompatible with the BPF structure and syntax, and also basically is just trading off the familiar name and co-opting it, an tool to investigate more systems in the kernel than usb and network traffic fills a need.
But as the article indicates, the security guarantees are inadequate, and Poettering tends to react to all feedback that could be construed as criticism, even attempts at constructive criticism as if he is being trolled. So instead of working with the community to architect a safer, stable tool that provided at least a compatibility layer with the actual BPF, he applied his own band-aid to the most glaring problems, them moved on to breaking something else. No change there.
So I'd say the interviewee missed that opportunity. The author could have prompted them in a question, but it wasn't required too, and justly might have wanted to leave Lennart's name out of it to cut down on moderation headaches later. As one of the more often to respond Vulture's, we know Dio reads the posts.
So to close I would say that security software is often the cause for problems in it's own right, but the answer isn't for us to whine about it, it's to pressure the OS makers, security companies, and open source community to start tackling the root issues with the tools head on. An improved eBPF or a replacement to it would be a handy tool. Too often an obviously bad but popular tool breaks things at scale these days, and security companies are some of the worst offenders when it comes to QA and code quality.
That is not an inevitable outcome, the kernels tackle thornier problems fairly gracefully, but it will take making it more of a priority and allowing changes to be made.