Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Hattie Cat (hattiecat@shitposter.club)'s status on Tuesday, 06-Nov-2018 17:37:07 EST Hattie Cat Hattie Cat
    Ruh roh - major vulnerability in use of SMT ("hyperthreads") with Intel CPUs, and suspected AMD may be vulnerable too. (Why we should never allow a monoculture to develop.) OpenBSD set to disable HT in upcoming releases. Better to disable HT in the BIOS. https://www.zdnet.com/article/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability/
    In conversation Tuesday, 06-Nov-2018 17:37:07 EST from shitposter.club permalink

    Attachments

    1. Unable to connect to tls://zdnet2.cbsistatic.com:443. Error: php_network_getaddresses: getaddrinfo failed: Name or service not known
      Intel CPUs impacted by new PortSmash side-channel vulnerability | ZDNet
      from ZDNet
      Vulnerability confirmed on Skylake and Kaby Lake CPU series. Researchers suspect AMD processors are also impacted.
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.