About time someone looked at AMD's "security". https://amdflaws.com FUD warning though: this isn't some "everyone with an AMD is doomed" scenario. This mostly affects those depending on advanced security features, stuff like fTPM (which was always suspect IMO).
-
Show this thread
-
Replying to @marcan42
this page says they all require admin privilege, so... (>'_')> https://www.anandtech.com/show/12525/security-researchers-publish-ryzen-flaws-gave-amd-24-hours-to-respond …
1 reply 0 retweets 2 likes -
Replying to @nanayapro
Exactly. This is just compromising higher-than admin privileges tiers. For consumers... That means you can use it to break DRM. And maybe BitLocker.
0 replies 0 retweets 4 likes -
This Tweet is unavailable.
-
Well, secure boot is supposed to have a built in root of trust these days so you can't just take over. That's what this bypasses. But for a lot of people this just means being able to take control over their own hardware. And there are so many other attack vectors for secure boot
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
This Tweet is unavailable.
-
Pretty much. I reckon the highest impact this will have is BitLocker bypass if you depend on secure boot (the mode where there's no boot time passphrase screen, just the regular login dialog - which was never a good idea).
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
Technically you can do that with LUKS too (it takes some effort though). It's better than nothing (if you can't afford a boot time password), but you have to take the added security with a huge grain of salt.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.