Deutsch English Français Italiano |
<aqu20j5u0pfps66trul8valeqs1n4vqsjo@4ax.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: John Savard <quadibloc@servername.invalid> Newsgroups: comp.arch Subject: Re: Another security vulnerability Date: Mon, 25 Mar 2024 07:26:35 -0600 Organization: A noiseless patient Spider Lines: 14 Message-ID: <aqu20j5u0pfps66trul8valeqs1n4vqsjo@4ax.com> References: <utpoi2$b6to$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Injection-Date: Mon, 25 Mar 2024 14:26:36 +0100 (CET) Injection-Info: dont-email.me; posting-host="2f2cf8acef47fc9aaccd6fbd0b81fff7"; logging-data="1178365"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18nFsrxXd3lQpeXUVovbQMuzMrOfOUwxho=" Cancel-Lock: sha1:4hD8HyIFCZGqJqQsyiU6EBa0/FI= X-Newsreader: Forte Free Agent 3.3/32.846 Bytes: 1457 On Sun, 24 Mar 2024 10:40:18 -0700, Stephen Fuld <sfuld@alumni.cmu.edu.invalid> wrote: >https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/ >So, is there a way to fix this while maintaining the feature's >performance advantage? While the article was pessimistic about fixing it by a microcode fix that could be downloaded, the description didn't suggest to me that it would be hard to correct it in future designs. Maybe my memory is faulty. John Savard