So this http://AMDflaws.com business... CTS Labs asked us to review their research last week, and sent us a full technical report with PoC exploit code for each set of bugs.
-
Show this thread
-
Regardless of the hype around the release, the bugs are real, accurately described in their technical report (which is not public afaik), and their exploit code works.
19 replies 55 retweets 72 likesShow this thread -
I initially responded to their request out of curiosity -- "Hey, do you want to see our new processor bugs before we release them?" "hell yes I do" -- but after their asks continued to grow billed them our week rate for the work.
7 replies 4 retweets 17 likesShow this thread -
Dan Guido Retweeted Arrigo Triulzi
I spent all morning talking to reporters, mostly to correct twitter hot takes. Yes, all the flaws require admin privs but all are _flaws_ not expected functionality.https://twitter.com/cynicalsecurity/status/973595697902706688 …
Dan Guido added,
13 replies 16 retweets 44 likesShow this thread
I did not see the whitepaper, video, media release, or anything else until a reporter sent it to me. Unlike everyone else, I only had the technical report and none of the media info.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.