Microsoft locked WireGuard creator Jason Donenfeld out of his developer account this week during a “mandatory verification” process, preventing him from signing drivers and shipping Windows updates. The verification portal closed before notifications were sent. VeraCrypt and Windscribe developers hit the same bureaucratic wall. No warnings, no emails, just “access restricted” when trying to publish critical security updates to millions of users.
The catch-22: Developers were required to verify accounts via a portal that no longer existed. Donenfeld checked every inbox, spam folder, and mail log. “Zero, nothing, zilch,” he said. Microsoft claims it sent emails starting in October 2025. The developers found nothing.
The Bureaucratic Nightmare
Microsoft launched “mandatory account verification” for the Windows Hardware Program on October 16, 2025. Partners had 30 days to verify identity with government-issued ID. The problem: Many developers never received notifications. The verification portal closed while developers remained unaware of any requirement.
Donenfeld discovered the lockout weeks later when attempting to submit a signed Windows Hardware Lab Kit package. “No warning at all, no notification,” he posted on Hacker News. “One day, I sign in to publish an update, and yikes, account suspended.” Mounir Idrassi, who maintains VeraCrypt encryption software, went public on March 30 with the same story. Windscribe reported being locked out for over a month despite eight years of verified account status.
The official appeals process offers a 60-day timeline with no expedited options. For critical security tools used by millions, that’s unacceptable. Donenfeld had a kernel driver update ready to ship. Users would have been exposed for months if a vulnerability had emerged during the lockout.
Public Pressure Fixed It Overnight
The story hit Hacker News on April 11 and immediately trended with 415 upvotes and 113 comments. Epic Games CEO Tim Sweeney amplified the issue. Microsoft VP of Windows and Devices Pavan Davuluri responded publicly within 24 hours, acknowledging the communication breakdown.
“We’re taking this as an opportunity to review how we communicate changes like this,” Davuluri said. By Thursday morning, accounts were reinstated. WireGuard released its new Windows version the next day. What the official 60-day appeal process couldn’t accomplish, public pressure on Hacker News resolved overnight.
This worked because WireGuard has visibility. Smaller open source projects without that platform would stay locked out for months, unable to ship security patches while users remain vulnerable.
Platform Gatekeeping Creates Systemic Risk
Microsoft is the sole gatekeeper for Windows kernel driver distribution. The centralized signing model theoretically improves security by ensuring drivers meet standards. It also creates a critical single point of failure. When Microsoft’s bureaucracy breaks down, global security infrastructure stops working.
WireGuard, VeraCrypt, and Windscribe provide security and privacy tools to millions of Windows users worldwide. During the lockout, if a critical vulnerability had been discovered, developers couldn’t ship patches. Windows won’t load unsigned drivers at the kernel level. There’s no workaround, no alternative distribution mechanism. Microsoft controls the only gate.
Donenfeld put it bluntly: “If there were a critical vulnerability to fix right now — there isn’t! I just mean hypothetically — then users would be totally exposed.”
What This Actually Means
Microsoft acknowledged the communication failure and reinstated the accounts. The immediate crisis resolved. The systemic problem remains: Critical open source infrastructure depends on proprietary platform vendor administrative processes.
Public pressure worked this time because the affected projects have visibility. The next developer locked out might not have 415 Hacker News upvotes to force a response. They’ll wait 60 days while their users stay vulnerable.
Platform gatekeeping isn’t inherently wrong. Centralized driver signing prevents malware. But when the gatekeeper’s bureaucracy fails—portal closes before notifications arrive, emails vanish into the void—millions of users get caught in the fallout. That’s not a process problem. That’s a systemic risk in how critical infrastructure gets distributed.

