WireGuard makes new Windows release following Microsoft signing resolution
Incident recap and resolution
- WireGuard’s Windows kernel driver signing account was locked as part of Microsoft’s Windows Hardware Program verification push; after a widely read HN thread, Microsoft quickly restored it.
- The maintainer describes it as bureaucratic process run amok, not a targeted attack, and is “happy to have the Windows release train cooking again.”
- Other projects (e.g., a filesystem driver, VeraCrypt, VPNs) report similar unexplained lockouts, sometimes for over a month.
Incompetence vs. malice
- One camp argues this is classic organizational incompetence and bad process, not a deliberate anti-WireGuard conspiracy.
- Another argues that “incompetence” at this scale, with no human recourse, is effectively malicious: reckless system design that predictably harms users and devs.
- Some say for practical purposes the response should be the same whether the root cause is malice or negligence.
Impact on smaller developers
- Many worry that only projects with large audiences can get attention via HN or social media; lesser-known developers may remain locked out indefinitely.
- Reported error messages explicitly said there was no appeal process, leaving publicity or legal threats as the only recourse.
- Some describe resolving similar Microsoft issues only by buying paid support and burning many hours on calls.
Code signing, platform control, and FOSS
- Several see mandatory signing, hardware/driver gatekeeping, and SmartScreen warnings as a growing threat to FOSS and small software on Windows.
- Comparisons are made to certificate authorities: some feel Microsoft has forfeited trust; others note CA programs distinguish carefully between malice and systemic failure.
- There is concern that “collateral damage” from automated enforcement conveniently suppresses small competitors and raises risk for indie devs.
Microsoft processes, communication, and trust
- Microsoft claims it warned partners via emails, banners, and reminders; many say such channels are noisy, easy to miss, and not sufficient for something this critical.
- Lockouts were silent for at least some developers; no proactive, human review occurred despite obvious telemetry about driver usage.
- Commenters emphasize fatigue with big-tech account lockouts, lack of due process, and the need for legal/organizational reforms and stronger advocacy (e.g., via digital-rights groups).
Technical / product side notes
- The new WireGuard Windows release drops pre‑Windows 10 support and had to work around removal of x86 driver compilation in the latest SDK.
- Some users ask about previous-version binaries, ReactOS compatibility, and minor behavior like reboots during update.