So this http://AMDflaws.com business... CTS Labs asked us to review their research last week, and sent us a full technical report with PoC exploit code for each set of bugs.
-
Show this thread
-
Regardless of the hype around the release, the bugs are real, accurately described in their technical report (which is not public afaik), and their exploit code works.
21 replies 61 retweets 77 likesShow this thread -
I initially responded to their request out of curiosity -- "Hey, do you want to see our new processor bugs before we release them?" "hell yes I do" -- but after their asks continued to grow billed them our week rate for the work.
7 replies 5 retweets 17 likesShow this thread -
Dan Guido Retweeted Arrigo Triulzi
I spent all morning talking to reporters, mostly to correct twitter hot takes. Yes, all the flaws require admin privs but all are _flaws_ not expected functionality.https://twitter.com/cynicalsecurity/status/973595697902706688 …
Dan Guido added,
13 replies 19 retweets 45 likesShow this thread -
Replying to @dguido
so based on the bugs you gave them, which stock should we short?
1 reply 0 retweets 7 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
