I’d love a blogpost written from the perspective of a chipmaker - Why this issue exists. I’d never question their competency, but it seems like a violation of expectations in hindsight. Based on my very limited understanding of these issues.
Spectre is more fun. The BTI attack is still a chip flaw, but you can forgive them for not thinking about it. That one is fixable. The real fun one is the misprediction/speculation attack. That one is fundamental. It affects how we think of secure coding.
-
-
I speculate (ha ha) that speculative execution barriers will become architectural and will be exported as compiler intrisics and we'll teach about them like we do for concurrency barriers and atomics for multithreading. There's just no easy magic fix.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.