Deutsch English Français Italiano |
<v95eog$pu8a$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Stephen Fuld" <SFuld@alumni.cmu.edu.invalid> Newsgroups: comp.arch Subject: A different type of security vulnerability Date: Fri, 9 Aug 2024 16:05:36 -0000 (UTC) Organization: A noiseless patient Spider Lines: 10 Message-ID: <v95eog$pu8a$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 7bit Injection-Date: Fri, 09 Aug 2024 18:05:36 +0200 (CEST) Injection-Info: dont-email.me; posting-host="dc2828c405bf54d43deeaa9c164b175d"; logging-data="850186"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18/EUX+AVX3F+S8j2JWI8Up0qcQhH3A0NI=" User-Agent: XanaNews/1.21-f3fb89f (x86; Portable ISpell) Cancel-Lock: sha1:N1avZhlDnMQoIZ5Rbg8UZrS5mTM= Bytes: 1233 This is totally different from the raft of side channel attacks we have seen recently. It seems much harder to implement, but potentially much more devastating. https://www.wired.com/story/amd-chip-sinkclose-flaw/ -- - Stephen Fuld (e-mail address disguised to prevent spam)