Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@SGrigorov Every Intel core processor since 2008 is affected, including the current gen
-
As I've said, it's twin attack affects every cpu manufacturer
They're all fucked
Even better, it can't be patched in software only made a bit harder to exploit
Happy being hackable or exchanging the cpu -
Noob64667y@SGrigorov to be fair it's a vulnerability that's pretty easy to avoid if you're cautious.
-
Who even fucking cares? Is someone working on hacking my PC because of this shit right now?
Where are the open source, free CPUs now?
That's what I thought. -
@mzeffect I'd love you to visit my nice website next month, which will definitely not run JavaScript that steals your passwords.
You should care -
@succcubbus OK, I care. Am I buying a new CPU though? That would also mean I need a new motherboard? Nope.
-
px0622467y@succcubbus running JavaScript on your website to steal passwords from visitors because of a CPU exploit? Seems legit, not sure what 1337 0day exploits you're using for that to take place. Can you also tell me how to download more ram?
-
@px06 meltdown and spectre are exploitable from javascript run inside the browser
So yes, reading internal browser memory from javascript currently is possible
Though browser vendors are working on mitigations and mitigations only, not patches
https://blog.mozilla.org/security/...
Related Rants
The S in Intel stands for Security.
undefined
repost
meltdown
intel