Ultimately, computing needs to come to terms with the fact that any time there is *any* shared resource, that's ripe for side channels. This includes main memory and peripheral devices. It's worse and more insidious the lower level and more tightly coupled you make it, like HT.
-
Show this thread
-
This Tweet is unavailable.
-
I have no idea what this "walled garden" you speak of is. You can experiment all you want at home. If you're #46 on the Fortune 500 list you do not get to "experiment, make mistakes, and make
#insecure things" that you then sell to customers.0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
Just because companies get to do awful things doesn't mean they should. If you don't care about security, that's great. Feel free to post your password on Twitter. Most of the rest of the world cares.
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
What? Those vulns are completely useless for anything but evil. I'm not shitting on a product line, I'm shitting on what is clearly a case of corporate culture that does not properly value and address security (especially given we've known about HT security issues for *years*).
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
Ah, if the LEO access argument is what you're going to make, sorry, this conversation is over. I really don't feel like debating this on Twitter. This topic has been beaten to death already. Your other two examples make no sense either.
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
If it's *your* system, you already have physical access and can access any RAM in a myriad of ways that are millions of times faster and more efficient. If it's *someone else's* system, you're committing a crime. Simple enough.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.