Allow me to summarize x86 side channel attacks: Spectre v1: speculation is insecure by design Spectre v2: secure branch prediction matters Meltdown: Intel are dumbasses L1TF: Intel are monumental, inexcusable dumbasses PortSmash: hyperthreading is insecure by design
Error correction should be on DRAM modules anyway, because ECC works better on large blocks, and DRAM rows are large blocks, but trying to transfer whole rows over the interface would be a huge bottleneck.
-
-
Interface abstraction. Rank/Bank RAS/CAS is somewhat like C/H/S for hard drives. I can envisage a row buffer and ECC on the interface chip or even hybrid memory technology devices: eDRAM/PSRAM, DRAM with NAND backing. The issue is latency. The PHYs have the necessary bandwidth.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.