GCC 7.3 Released! Includes fixes for #Spectre ! https://gcc.gnu.org/ml/gcc/2018-01/msg00197.html …
-
-
The canonical attacks are ones where the attacker-controlled "data" is code that runs in a sandbox/interpreter/jit, but...
-
Soon after Spectre was announced, I speculated (pardon the pun) that it may be possible to exploit via data that nobody thinks of as "code" if there are ways to observe the timing of processing it. Nobody has PoCs for that AFAIK, though.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.



