The Spectre/Meltdown naming makes it easy to forget there are in fact *three* distinct vulnerabilities, each requiring separate mitigations. Here’s an overview:https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html …
-
-
Variant 2 enables variant 1 across protection domains on the same CPU core (e.g. across guest/host mode, CPU rings, or processes). Fixing requires a microcode update from the CPU vendor, or hypervisor software mitigations such as Retpoline.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
i’m sorry, can you put this in terms of bathroom usage at a party?
-
Variant 1: someone falsely convinces
@jaffathecake he’s presenting in 5 minutes, making him want to speculatively pee. While doing so, he accidentally drops his password-engraved headphones in a urinal. An attacker perusing the next urinal observes this and steals the password. - 3 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
JavaScript, HTML, CSS, HTTP, performance, security, Bash, Unicode, i18n, macOS.