Deutsch   English   Français   Italiano  
<jwv8r26gtzv.fsf-monnier+comp.arch@gnu.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Stefan Monnier <monnier@iro.umontreal.ca>
Newsgroups: comp.arch
Subject: Re: Another security vulnerability
Date: Mon, 25 Mar 2024 12:26:30 -0400
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <jwv8r26gtzv.fsf-monnier+comp.arch@gnu.org>
References: <utpoi2$b6to$1@dont-email.me> <utq715$jsuq$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 25 Mar 2024 17:28:50 +0100 (CET)
Injection-Info: dont-email.me; posting-host="82d1b87aaa7ddf8bd39513734b9ac6f6";
	logging-data="1263436"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18h5tjkqur0Vh8GypJeeEU13a8FCGVu/0Q="
User-Agent: Gnus/5.13 (Gnus v5.13)
Cancel-Lock: sha1:5YRGtTRFdNHxgNoY+RaKmiw/scU=
	sha1:ZDy0arsHp5NzdB4PuMB1Sg0QCKM=
Bytes: 1476

>> So, is there a way to fix this while maintaining the feature's
>> performance advantage?
> Even if it’s fixed, how does that help existing users with broken
> machines?

Of course, the current computing world loves it even more if it pushes
users to buy new machines.

This said, until now manufacturers don't seem to consider side-channel
attacks as something worth spending much effort to avoid, so I'd expect
future machines to be just as vulnerable :-(


        Stefan