Okay, I should've shouted this earlier. THE AMD VULNERABILITIES THAT JUST CAME OUT HAVE NOTHING WHATSO-FUCKING-EVER TO DO WITH MELTDOWN/SPECTRE IN SCOPE, DANGER, OR APPLICABILITY. ANY COMPARISONS DEMONSTRATE A COMPLETE LACK OF UNDERSTANDING AND A FAILURE AT TECH JOURNALISM.
-
Show this thread
-
They're not Spectre/Meltdown bad, but they're still bad. Defeats the purpose of Secure Boot, for a start.
1 reply 0 retweets 1 like -
You mean like the other over 9000 ways you can break secure boot on x86?
1 reply 1 retweet 8 likes -
I'm not aware of practical attacks against Secure Boot itself (i.e. not Microsoft-only attacks) but I'm open to hearing more about these attacks
1 reply 0 retweets 0 likes -
Also, how persistent are the AMD attacks? If, like the Intel ME attacks, you cannot reasonably recover without resorting to flashing over SPI (or worse!), then that's pretty major.
1 reply 0 retweets 0 likes
No, it's not pretty major. It's what has been the status quo since the advent of Flash memory until secure boot started pretending like it totally fixed this problem (when it didn't). How do you break secure boot? Just audit a BIOS. Find a bug. Any bug. There are loads.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.