Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
AMD marketing will find a way to let this golden opportunity slip through it's fingers.
Spectre 1 applies to older amd cpu's not ryzen/TR/epyc from my understanding.
Spectre 1 applies to older amd cpu's not ryzen/TR/epyc from my understanding.
This isn't going to effect gaming and desktop applications as much as it'll effect datacenter operations, such as database and large data set workload applications.
We're already in talks with Cisco about upgrading our blades, but they don't currently offer AMD based solutions. That's going to change very quickly.
I'm happy....
So far.....
(Reason in signature)
don't participate in the class action.
sue independently in small claims.
Intel will not show up, and you'll get a thousand bucks for a new laptop.
AMD better take this as an opportunity to step in and offer deals on enterprise data center solutions...the result could be Epyc for their bottom line.
It is a nice system, I would probably not use those graphics cards but perhaps you have a reason for it and I am cool with that.
I do lots of adobe stuff at my job, and I crunch video for my students video projects. The Vega FE is a really nice card for that, I got the second one for well, just because....I've always had a soft spot in my heart for AMD. I've owned many Intel/Nvidia systems during my days though and will switch back when my wallet dictates. The 1950X was too good of a deal to pass up at the time.
https://spectreattack.com/spectre.pdf said:1.3 Targeted Hardware and Current Status
Hardware.
We have empirically verified the vulnerability of several Intel processors to Spectre attacks, including Ivy Bridge, Haswell and Skylake based processors. We have also verified the attack’s applicability to AMD Ryzen CPUs. Finally, we have also successfully mounted Spectre attacks on several Samsung and Qualcomm processors (which use an ARM architecture) found in popular mobile phones.
This is still a little fuzzy to me. So what does the exploit do? does it dump random snippets from memory, the entire memory, or can it gain direct access to a specific targeted app's memory locations?
Yes what?Yes.
"Oh look, the hardware that runs the entire @#$% cloud has a major security flaw...but since my Crysis frame rate is unaffected, it must be no big deal."
Is this seriously a conversation we're having right now?
Yes what?
Source on that?ALL of the things you mentioned are enabled via these attacks.
Source on that?
Why would you want random memory fragments if you can target specific running apps? If the exploit enables targeted memory access the other two are meaningless.
I read that page and it doesn't mention any specifics like that. Or do you mean the actual white papers linked there? Did you read those?The whitepapers from the people who discovered it. https://meltdownattack.com/
I read that page and it doesn't mention any specifics like that. Or do you mean the actual white papers linked there? Did you read those?
This is still a little fuzzy to me. So what does the exploit do? does it dump random snippets from memory, the entire memory, or can it gain direct access to a specific targeted app's memory locations?
https://meltdownattack.com/meltdown.pdf said:Meltdown allows an unprivileged process to read data mapped in the kernel address space, including the entire physical memory on Linux and OS X, and a large fraction of the physical memory on Windows. This may include physical memory of other processes, the kernel, and in case of kernel-sharing sandbox solutions (e.g., Docker, LXC) or Xen in paravirtualization mode, memory of the kernel (or hypervisor), and other co-located instances. While the performance heavily depends on the specific machine, e.g., processor speed, TLB and cache sizes, and DRAM speed, we can dump kernel and physical memory with up to 503 KB/s.
https://spectreattack.com/spectre.pdf said:Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary. This paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim’s process.
I read that page and it doesn't mention any specifics like that. Or do you mean the actual white papers linked there? Did you read those?
I'm happy....
So far.....
(Reason in signature)
I like how the mufuka that be the intel ceo, keeps this bullshit quiet just long enough for him to dump his millions of bucks of shares before news leaked out and intel share value fell.
What a cnut.
Very possibly illegal
Ok maybe I'm not understanding this. But it looks to me like 1) someone has to get a malicious program running on my system; 2) has use this exploit to get a memory dumb; 3) has to somehow get that memory dump transmitted to them and 4) has to comb through to see if they got lucky to get a password (and know what that password applies to) or CC#. I'm not losing much sleep over this (but I'm not running a server for say Amazon I'm only talking about my home PC). And a program to do 1-3 seems like that's going to have a signature once known and can be virus scanned.
And for speed. This mostly is on I/O. I/O that's cached and can be predicted is that correct? So my most I/O intensive task is doing a make on a large project. But it's just reading straight from the SSD and then writing the complied code back to the SSD, so this isn't likely to be effected by the patch if I understand what's going on.
It's not AMD at all and only some arm processors which arm themselves have listed on their site.The cnn.Com article makes it sound like this is all intel, arm, and amd systems or pretty much all computers.
Didn't see a feedback link and had to leave for work.
Well, right now, but it seems like to be useful (for targeting your average home user) it will need a malware tool kit (again I'm only talking home, not some server that has tons of users of various levels). Anyway glad I'm not running DB servers, but those server farms, yikes!Yes, this is only a vulnerability. It's not a malware tool or package.
Bunch of malarky to me. Disabling the particular workaround on my Win10 box and moving along without performance hits. I can accept this risk.