Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connectionsPath: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Stefan Monnier
Newsgroups: comp.arch
Subject: Re: Another security vulnerability
Date: Mon, 25 Mar 2024 12:26:30 -0400
Organization: A noiseless patient Spider
Lines: 14
Message-ID:
References:
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 25 Mar 2024 17:28:50 +0100 (CET)
Injection-Info: dont-email.me; posting-host="82d1b87aaa7ddf8bd39513734b9ac6f6";
logging-data="1263436"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18h5tjkqur0Vh8GypJeeEU13a8FCGVu/0Q="
User-Agent: Gnus/5.13 (Gnus v5.13)
Cancel-Lock: sha1:5YRGtTRFdNHxgNoY+RaKmiw/scU=
sha1:ZDy0arsHp5NzdB4PuMB1Sg0QCKM=
Bytes: 1476
>> So, is there a way to fix this while maintaining the feature's
>> performance advantage?
> Even if it’s fixed, how does that help existing users with broken
> machines?
Of course, the current computing world loves it even more if it pushes
users to buy new machines.
This said, until now manufacturers don't seem to consider side-channel
attacks as something worth spending much effort to avoid, so I'd expect
future machines to be just as vulnerable :-(
Stefan