If you aren't using it to bootstrap full verified boot of the OS or something else leveraging it then it doesn't seem to matter much. Desktop Windows and desktop Linux don't really benefit much since they don't do that. Verifying only the kernel isn't particularly helpful.
-
-
-
The hardware security features it implements don't seem widely used. Even if there AMD Chromebooks, they probably wouldn't be using this to implement verified boot so it's not clear that it would even matter. Maybe if it's used as a TPM implementation it would impact encryption.
-
Not clear that there's much usage of these features anywhere. The hardware memory encryption, etc. doesn't seem widely adopted by software yet and those are server / enterprise-oriented features where major software upgrades are done incredibly slowly...
-
Not clear why there's a bunch of hype for something no one is leveraging. 24h coordinated disclosure is probably to make sure they can get maximum possible coverage out of it since AMD wasn't ready with an announcement. They get to present it as the end of the world uncontested.
-
If I understand correctly, they've privately reported full details to AMD and published high-level description of the bugs they've found - not enough details to reproduce or verify. I think that's pretty harmless, this is hardly high-risk stuff anyway.

-
Their graphic design is
though
End of conversation
New conversation -
-
-
Perhaps it will encourage revisiting past experiments: http://goo.gl/homZgA !
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It does let you work around a few of the ways you can use that hardware stuff for ensuring integrity of the installed OS, but... Otherwise, yeah. The situations where it's a real attack are niche.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.