"In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."
Why no exploit code out there other then proof of concept code then after 9 months. Typically, exploits are out in the public within 4 hours of patch Tuesday.
Remember, my comments were about using spectre/meltdown to turn home user machines into zombies.
Going back to my original point, just don't worry! (if you are a home user. Businesses have a different risk profile)Which is why microcode updates are also applied on operating system startup by Windows and Linux distributions.
Just to reiterate then entire point of what I have been posting about. Home users simply don't need to worry about these vulnerabilities. Mitigations are already in place on their machines. Particularly if they have an up to date security suite installed.
"In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."
Well it could be used to map the address randomisation so stripping that level of protection from a PC making remote exploits easier. These things are seldom used in isolation.
If you can discover someone's router password via Spectre and they have public admin turned on (sadly commonplace) they could botnet that.
But otherwise I do agree, don't stress over the performance impact just stay patched and generally up to date. Making any other choice will likely hurt.
I think we agree on the "don't stress" side of things.
Your scenario is indeed possible, however I also originally said "Can you then please explain how it is economically viable to use said process to make lots of money. Or explain how someone with the vast resources required to create said process will use it in such a way that it ends up indiscriminately attacking members of the public."
I appreciate that is not what you were responding to directly.
The context of my comments was that the botnet/zombie scenario where spectre/meltdown is used as a part of the attack that indiscriminately attacks the general public. The cyber risks to the general public are these days entirely about criminals making money. For a making money scenario, the criminals will not go for an incredibly difficult and complex exploit chain that's unreliable at best. They will target the easiest ways of making money, such as ransomware, cryptomining malware etc.
I hasten to add that things are different with businesses. Some don't need to care. Others really do!
"In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."
Not sure if true:
https://mobile.twitter.com/witeken/s...43796660387840
10nm desktop parts in 2020??
Intel is moving back some of it's chip production back to 22nm:
https://www.tomshardware.com/news/in...10c,37819.html
What's the betting they're using 22FFL.
Whilst not great in the short term overall, I hope so. I want to see AMD overtake Intel performance wise both for desktops and server and make enough money to really up their R&D again. Hopefully enough to get their market share high enough to keep Intel on its toes. That will keep costs down for us in the years to come.
"In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."
There are currently 1 users browsing this thread. (0 members and 1 guests)