If you haven't run into unsigned drivers, you haven't been around windows software much.
Hi Meta4
I can't speak for murmur but I've been working with I/T, occasionally as a primary career but usually as adjunct to my other primary roles for about 37 years, I think windows 2.0 was the standard at that time although like a lot of us I didn't get on the windows wagon for some years afterwards. Obviously, I've seen countless sets of unsigned drivers since the driver certification scheme was introduced. In fact it wasn't so many years ago that unsigned drivers were the norm and verified drivers were rare.
Over
at least the last 5 years that has turned around dramatically. Obviously you still see them but usually from small startups or work alone software engineers on obscure projects. On billion dollar entities is a different matter.
The unsigned driver by itself is not the major issue anyway, it's the requirement to turn off Anti Malware or system monitoring during install (having not installed the simulator I'm taking the OP's word about this as fact). Why should I need to do that? The only reasons that come to mind are that the install modifies the TCP stacks, changes the registry or performs some other restricted function, while I allow this from some software as it's necessary I still want to know why before I do. The other main cause is because the software causes a false positive on many modern anti malware suites, once again not uncommon and many applications do, remote administration software springs straight to mind.
In these cases with reputable vendors it's always well documented on the software vendor's home that this is a case and it can usually be confirmed with your anti malware vendor that this situation exists. Neither of these hold true with DJI from a quick look.
I'd say the chance of malware is zero
With respect, in my opinion at least the chance of malware is *never* zero. We've seen it inserted into legitimate banking applications and government sponsored apps before now. If Facebook and google can be hacked who am I to think myself immune?
the reason is simple slackness
I could accept this from the likes of startup companies or stand alone software engineers as mentioned above but a Billion dollar enterprise that can announce a $150 million dollar loss due to fraud and still march on (apparently) unfazed does not have an I/T department professional enough to oversee having their drivers signed? .......
Look, it is probably paranoid to state "It's a Chinese commercial super entity and the Chinese government and or military probably have a hand in there somewhere" but the sad fact is
It's a Chinese commercial super entity and the Chinese government and or military probably have a hand in there somewhere.
I realise that sounds like something from the "tinfoil hat brigade" but I still do work for regional I.S.P.s and some remote Systems Admin work over and above my R.P.A. work. I keep a couple of hardened work stations on the home network and it's my job at times to keep a roll of tinfoil laying around the workshop.
When Mr Average has and raises a concern I think it's counter productive to dismiss it out of hand. I think being responsible you have to say, "well, it may well be nothing to worry about but don't take it for granted". The unsigned drivers are one thing but if indeed I do need to turn off system security to install it I want a public statement from the vendor as to why and I want it independently verified and I don't care if that software comes from the governments itself ... infact probably MORE so if it comes from the Government lol.
You don't have to agree of course, maybe I'm just old and jaded who knows?
Regards
Ari