Allow me to summarize x86 side channel attacks: Spectre v1: speculation is insecure by design Spectre v2: secure branch prediction matters Meltdown: Intel are dumbasses L1TF: Intel are monumental, inexcusable dumbasses PortSmash: hyperthreading is insecure by design
-
-
Of course, it takes a very special kind of idiocy to not only do that but *also* use garbage address data on nonpresent pages *and* short-circuit EPT while you're at it, which is L1TF and an Intel exclusive.
-
Intel is terrible at security. when your hardware is more secure with the security features like ME disabled it says all you need to know about sloopy security
End of conversation
New conversation -
-
-
That’s true. But how much was that timing impact when the design was first done? It’s pretty rude to call the CPU designers idiots for a reasonable decision taken by many different teams. Especially when you don’t understand the trade-offs involved 1/N
-
@jonmasters made a good point that the lack of communication between SW and HW is a cause of the security problem. Understanding why the decision was made is probably a good idea, rather than assuming incompetence or idiocy. 2/N - Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.