Okay, I should've shouted this earlier. THE AMD VULNERABILITIES THAT JUST CAME OUT HAVE NOTHING WHATSO-FUCKING-EVER TO DO WITH MELTDOWN/SPECTRE IN SCOPE, DANGER, OR APPLICABILITY. ANY COMPARISONS DEMONSTRATE A COMPLETE LACK OF UNDERSTANDING AND A FAILURE AT TECH JOURNALISM.
-
-
Car analogy for those who still don't get it: HACKERS CAN TAKE OVER YOUR CAR FROM THE OTHER SIDE OF THE COUNTRY vs HACKERS CAN TAKE OVER YOUR CAR BY OPENING THE HOOD AND PLUGGING IN STRAIGHT INTO THE ECU.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Try it this way: TO EXPLOIT MELTDOWN YOU NEED SOME JAVASCRIPT ON A WEBSITE. TO EXPLOIT THIS FIRMWARE STUFF YOU NEED KERNEL MODE CODE EXECUTION. LEARN THE FUCKING DIFFERENCE.pic.twitter.com/tfSBP8QmHX
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Has someone really discovered a way to exploit Meltdown from a browser? How's the exception being controlled?
-
Same as Spectre. You wrap it in a mispredicted branch (out of bounds access). I'm not aware of any public PoCs but I believe private ones exist.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.