Skip to content
By using Twitter’s services you agree to our Cookies Use. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
  • Home Home Home, current page.
  • About

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
FioraAeterna's profile
Fiora / フィオーラ @ Anywhere But AX-po  !! 🧙‍♀️
Fiora / フィオーラ @ Anywhere But AX-po  !! 🧙‍♀️
Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️
@FioraAeterna

Tweets

Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️

@FioraAeterna

Atelier cosplayer、photo editor。アトリエシリーズのレイヤー、錬金術師、加工芸人。DM for commission: props、3Dprint、photo edit。日本語でOK。20↑ she/her。1st place group cos ACEN2018

San Jose, CA
Joined April 2014

Tweets

  • © 2018 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not working for you?

    Hover over the profile pic and click the Following button to unfollow any account.

    Say a lot with a little

    When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.

    Learn the latest

    Get instant insight into what people are talking about now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

    Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️ Retweeted Heather Adkins

    okay i actually fucking LOVE this bug so much omg. this is even better than i thought it was. sorry, i apologize, i'm gonna fangirl a little bit here sorryhttps://twitter.com/argvee/status/948682737057189888 …

    Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️ added,

    Heather Adkins @argvee
    Now with full details. CPU bugs Kudos @tehjh https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html …
    2:34 PM - 3 Jan 2018
    • 1,071 Retweets
    • 2,131 Likes
    • Web Dev PLOW Ian Coldwater Apoorv Singh hodgepodge 🌹Carmen Hernández Andoh🌹 Роман Черницын ruaríø Pavel Strekalov Hanh Pho
    18 replies 1,071 retweets 2,131 likes
      1. New conversation
      2. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        first of all: the attack isn't intel-specific. it's not (QUITE) a hardware bug. it's extraordinarily clever.

        5 replies 41 retweets 228 likes
        Show this thread
      3. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        if i understand right: the simplest variant works like this. basically all modern CPUs speculate loads far beyond the point where they know it's safe. this is necessary for even half-decent performance in a big pipeline.

        5 replies 52 retweets 196 likes
        Show this thread
      4. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        so if you do this: a = x[4]; b = y[a]; c = z[b]; it may load "c" long before it even knows the load of "a" was safe! this is fine as long as it can roll things back in the case the first load failed. completely normal

        3 replies 52 retweets 218 likes
        Show this thread
      5. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        the catch here is: doing the load puts that data in the cache. so... imagine you're not supposed to be able to know "b" because it's in kernel memory. it'll load b, and then load z[b] to get c. then at some point it will fail and roll back.

        2 replies 21 retweets 156 likes
        Show this thread
      6. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        but this will have a side effect: the chunk of memory containing "c" will end up getting loaded into cache. the rollback *isn't total*. it's like the CPU went ahead to the next page of an assignment before it was supposed to, but didn't completely hide that fact.

        9 replies 28 retweets 207 likes
        Show this thread
      7. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        and given the right circumstances, you can use this to recover "b", one bit at a time.

        4 replies 16 retweets 140 likes
        Show this thread
      8. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        you can now recover arbitrary data from any memory in the system. you win.

        2 replies 26 retweets 195 likes
        Show this thread
      9. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        (there's other variants that use branch prediction, etc to apply the approximate same attack. but the core idea is the same: construct a case where the CPU leaves a visible trail of its speculative execution)

        1 reply 9 retweets 137 likes
        Show this thread
      10. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        someone who read more of the article than me tell me if i'm wrong tho

        11 replies 2 retweets 86 likes
        Show this thread
      11. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        oh, and one last thing: the thing that gets me most about this exploit is it isn't really a single exploit, it's a whole *category* of exploits. verifying that no further attacks exist sounds EXTREMELY hard.

        2 replies 100 retweets 396 likes
        Show this thread
      12. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        i kinda get why they had to use such a big software hammer on this: i'd be reaaallllyyy nervous about some clever trick solution purporting to patch up an infinity of tiny holes

        3 replies 12 retweets 169 likes
        Show this thread
      13. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        hey @erincandescent, feel like writing some verilog verification proving that it's impossible to pass any knowledge from kernel to userspace, , , , ,

        4 replies 3 retweets 92 likes
        Show this thread
      14. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️ Retweeted czub @ AX

        also if you like this kind of tech nonsense it's probably worth reading the whole thing, since they did stuff like thishttps://twitter.com/mczub/status/948691303574810624 …

        Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️ added,

        czub @ AX @mczub
        Replying to @mczub @FioraAeterna
        also 'oh yeah we reverse engineered all of haswell's branch predictor, no biggie'
        6 replies 34 retweets 197 likes
        Show this thread
      15. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 3

        oh i guess i should add: AMD's claim that they're safe is bc they made the design choice not to allow speculation past privilege boundaries. which isn't airtight but is a pretty hella solid chunk of safety

        7 replies 97 retweets 400 likes
        Show this thread
      16. End of conversation
      1. New conversation
      2. Jing Yao‏ @theJingster Jan 4
        Replying to @FioraAeterna

        As I understand, this is the basic concept for meltdown and spectre but everyone says spectre is harder to exploit and affects all processors, including AMD with no way to patch. Can you explain the difference between meltdown and spectre that explains this tidbit?

        1 reply 0 retweets 0 likes
      3. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 4
        Replying to @theJingster

        i wrote this before the names/distinctions were out, but -- meltdown: using this technique to break VM protection (e.g. steal kernel memory)

        1 reply 1 retweet 4 likes
      4. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 4
        Replying to @FioraAeterna @theJingster

        spectre: harder to exploit, more general, far harder to mitigate: using this technique to steal data *within* a program, e.g. a website's javascript stealing other data in the browser

        2 replies 1 retweet 6 likes
      5. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 4
        Replying to @FioraAeterna @theJingster

        the distinction here is that spectre *doesn't violate memory protections* and largely involves abusing existing code paths (ROP-style).

        1 reply 0 retweets 5 likes
      6. Jing Yao‏ @theJingster Jan 4
        Replying to @FioraAeterna

        I see. That’s more clear. Thanks! I am still a bit confused why spectre can’t be patched w/out hardware architecture changes while meltdown can. These proposed hardware changes basically mean adding security checks prior to speculation right? So slower speeds vs. previous gen?

        1 reply 0 retweets 0 likes
      7. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 4
        Replying to @theJingster

        meltdown: unmap kernel memory before returning to userspace, thereby making speculation impossible. only possible to begin with on chips that allow speculation across privilege boundaries

        1 reply 1 retweet 4 likes
      8. Fiora / フィオーラ @ Anywhere But AX-po !!  🧙‍♀️‏ @FioraAeterna Jan 4
        Replying to @FioraAeterna @theJingster

        spectre: there's no memory protection involved so good fxcking luck

        1 reply 1 retweet 7 likes
      9. Jing Yao‏ @theJingster Jan 4
        Replying to @FioraAeterna

        💡 Wow. So what does this mean for cpu architecture?

        1 reply 0 retweets 1 like
      10. 5 more replies

    Loading seems to be taking a while.

    Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

      Promoted Tweet

      false

      • © 2018 Twitter
      • About
      • Help Center
      • Terms
      • Privacy policy
      • Cookies
      • Ads info