Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Thomas Koenig Newsgroups: comp.arch Subject: Re: Another security vulnerability Date: Mon, 25 Mar 2024 06:37:31 -0000 (UTC) Organization: A noiseless patient Spider Lines: 18 Message-ID: References: Injection-Date: Mon, 25 Mar 2024 07:37:32 +0100 Injection-Info: dont-email.me; posting-host="c82fd9f9d9cd7da70d6296be48125340"; logging-data="987162"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/E61RNfaoQzpeYgZIhTlJn/vVExWCjyZI=" User-Agent: slrn/1.0.3 (Linux) Cancel-Lock: sha1:3SUNgHb0qVFKRu5Uh1YlUAXTpbI= Bytes: 1582 Stephen Fuld schrieb: > https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/ It's Groundhog Day, all over again! > So, is there a way to fix this while maintaining the feature's > performance advantage? From what is written in the article, nothing is currently known. For new silicon, people could finally implement Mitch's suggestion of not committing speculative state before the instruction retires. (It would be interesting to see how much area and power this would cost with the hundreds of instructions in flight with modern micro-architectures). For existing silicon - run crypto on efficiency cores, or just make sure not to run untrusted code on your machine :-(