Deutsch English Français Italiano |
<20240326192941.0000314a@yahoo.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Michael S <already5chosen@yahoo.com> Newsgroups: comp.arch Subject: Re: Another security vulnerability Date: Tue, 26 Mar 2024 18:29:41 +0200 Organization: A noiseless patient Spider Lines: 16 Message-ID: <20240326192941.0000314a@yahoo.com> References: <utpoi2$b6to$1@dont-email.me> <2024Mar25.082534@mips.complang.tuwien.ac.at> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Injection-Date: Tue, 26 Mar 2024 17:29:50 +0100 (CET) Injection-Info: dont-email.me; posting-host="9a8f240f50772d42a957aee0b59324e0"; logging-data="1961728"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18b7ib3OOWk8H4g7W5G2AoKUUhSvBbKtyc=" Cancel-Lock: sha1:oLRkE4d8jKsnX4hC2B0G/qpwEFo= X-Newsreader: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-w64-mingw32) Bytes: 1514 On Mon, 25 Mar 2024 07:25:34 GMT anton@mips.complang.tuwien.ac.at (Anton Ertl) wrote: > Stephen Fuld <sfuld@alumni.cmu.edu.invalid> writes: > >https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/ > > > > That's a pretty bad article, but at least one can read it without > JavaScript, unlike the web page of the vulnerability > <https://gofetch.fail/>. > In case you missed it, the web page contains link to pdf: https://gofetch.fail/files/gofetch.pdf