Allow me to summarize x86 side channel attacks: Spectre v1: speculation is insecure by design Spectre v2: secure branch prediction matters Meltdown: Intel are dumbasses L1TF: Intel are monumental, inexcusable dumbasses PortSmash: hyperthreading is insecure by design
-
-
Also PortSmash should be adaptable to AMD systems with HT (i.e. Zen) and also all the POWER stuff. And it gets worse, because under more specific circumstances and with cleverer exploits, the side channels go beyond HT and to shared caches too.
Show this thread -
Ultimately, computing needs to come to terms with the fact that any time there is *any* shared resource, that's ripe for side channels. This includes main memory and peripheral devices. It's worse and more insidious the lower level and more tightly coupled you make it, like HT.
Show this thread
End of conversation
New conversation -
-
-
This Tweet is unavailable.
-
Well if it's single tenancy, that is, not in the cloud on shared architecture, it shouldn't really matter. I would think this is more of an issue for shared hardware with multiple tenancy.
End of conversation
-
-
-
In Linux, it seems L1TF and TLBleed have greatly raised interest in a permanent solution; see https://lwn.net/Articles/764482/ … for example.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Does Linux do that?
-
Not yet.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.