Deutsch   English   Français   Italiano  
<utr63b$u40q$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Thomas Koenig <tkoenig@netcologne.de>
Newsgroups: comp.arch
Subject: Re: Another security vulnerability
Date: Mon, 25 Mar 2024 06:37:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <utr63b$u40q$1@dont-email.me>
References: <utpoi2$b6to$1@dont-email.me>
Injection-Date: Mon, 25 Mar 2024 07:37:32 +0100
Injection-Info: dont-email.me; posting-host="c82fd9f9d9cd7da70d6296be48125340";
	logging-data="987162"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/E61RNfaoQzpeYgZIhTlJn/vVExWCjyZI="
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:3SUNgHb0qVFKRu5Uh1YlUAXTpbI=
Bytes: 1582

Stephen Fuld <sfuld@alumni.cmu.edu.invalid> schrieb:
> https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/

It's Groundhog Day, all over again!

> So, is there a way to fix this while maintaining the feature's 
> performance advantage?

From what is written in the article, nothing is currently known.

For new silicon, people could finally implement Mitch's suggestion
of not committing speculative state before the instruction retires.
(It would be interesting to see how much area and power this
would cost with the hundreds of instructions in flight with
modern micro-architectures).

For existing silicon - run crypto on efficiency cores, or just
make sure not to run untrusted code on your machine :-(