Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 03-Jan-2018 23:08:45 EST Mike Gerwitz Mike Gerwitz
    As is necessary, the processor exploits have been given press-friendly names: Meltdown and Spectre.

    https://meltdownattack.com/
    https://spectreattack.com/ (same site)

    Intel's inadequate response:

    https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

    A write-up by Project Zero:

    https://googleprojectzero.blogspot.fr/2018/01/reading-privileged-memory-with-side.html

    I won't have the time to get into the low-level details tonight, but this is nasty. There are plenty of things I can say here to reiterate various topics, but I don't think that'd be constructive just yet; let's let others discover some corollaries for themselves.

    Happy New Year!
    In conversation Wednesday, 03-Jan-2018 23:08:45 EST from social.mikegerwitz.com permalink

    Attachments

    1. Reading privileged memory with a side-channel
      Posted by Jann Horn, Project Zero We have discovered that CPU data cache timing can be abused to efficiently leak information out of mi...
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.