Every Intel processor since 1995 has a critical security flaw. Good news: - it's kinda sorta patched Bad news: - the patch slows down your machine - you can't avoid the patchhttp://www.zdnet.com/article/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable/ …
-
-
I believe virtually all embeddable languages (e.g. JS, Lua) running in the same process context, especially if they're JIT'd, can achieve reads to the host process's full memory. Which is very bad.
-
According to RedHat the functional differences in how Intel processors handle exceptions during speculative execution versus AMD. https://access.redhat.com/security/vulnerabilities/speculativeexecution … Spectre does affect them, but Meltdown appears not to.
-
Yes. Spectre is the scary one. Meltdown is practical to mitigate in several ways but anything affected by Spectre is basically hardware that needs to be trashed.
-
Which is annoying because it means 20 years of processors need to go down the drain, if what I'm hearing is correct. Though I'm also hearing it requires a program run on the system to get any of the necessary access. So it's less an issue for individuals than Clouds.
-
Individuals run hundreds of untrusted and mostly-malicious programs every time they load a web page, especially if they don't use an adblocker.
-
True enough. I've been caught before, usually when a browser updates and invalidates an Adblocker.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.