#MarketLeader
Starting to sound like Intel isn't HIPAA compliant.Wow, never considered that type of use case and the liability aspect, even banking I'd imagine that would apply and other markets too. Thanks for the goss
You might be just in time for 7nm APUs with Zen2 + Navi. That's something I'd be very excited for and may also jump then or next gen (if they include HBM on interposer), either way it's cheap, good iGPU fast laptops that won't break the bank.
Sheesh...Once all these patches and fixes that degrade performance are implemented, my 3770K is going to be so bogged down that I'll probably miss my dual P-III 1000 system.
This probably just sealed the deal for going with a Ryzen next spring when I overhaul my gaming PC.
So yet another vulnerability that requires local access. Stop the presses!
more like Pentium pro, really intel drop every last bit of p6 architecture form your CPUs and make something 100% new for once.From what I hear, they've been an issue since the Pentium IV, so I wouldn't hold my breath![]()
Sheesh...Once all these patches and fixes that degrade performance are implemented, my 3770K is going to be so bogged down that I'll probably miss my dual P-III 1000 system.
Do you have a secure server room? Can anyone else physically access your servers? Are your USB ports shut down/disabled? Is your BIOS password protected?
If you don't have a secure server room for all of your intel machines and non approved people can physically access your servers then you're hosed.
If you have systems outside of the server room with server room level of access and active USB ports then you're hosed.
If you have all of that and the ports are disabled but the BIOS isn't password protected... then you're hosed.
Security is a picket fence where we need to pick and choose where our battles take place and where access's are prevented or allowed.
As intel continues to have vulnerabilities exposed the picket fences grow more gaps.
Yea to a home user some of these are eye-roll worthy. But if you work for a company with proprietary data (data being more valuable than Oil today.) and you need to control access to said data or risk devaluing your company, then these vulnerabilities ARE a big deal.
And Admins/Engineers/Managers and above that roll their eyes at these vulnerabilities should be fired and replaced with people that actually care.
some patches exclude ryzen cpu's (some older amd cpu's are affected) though there were couple controversies about patches being rolled out to ppl with ryzen/epyc systems while they only hurt performance without providing anything for them.That, and as Intel, motherboard manufacturers, and Microsoft partner up and rollout their remedies, the resulting performance degradation affects *everyone*.
I'm sure there's a way to spin this as positive PR.
On September 10, 2019, researchers from VU Amsterdam published a whitepaper titled, “NetCAT, Practical Cache Attacks from the Network.” In scenarios where a malicious actor has a direct network connection to the target system, NetCAT may enable a Prime+Probe style exploit that targets processors supporting Intel® Data-Direct I/O Technology (Intel® DDIO) and Remote Direct Memory Access (RDMA) to disclose system information
This issue has a low CVSS base score of 2.6. In scenarios where Intel DDIO and RDMA are enabled, strong security controls on a secured network are required, as a malicious actor would need to have read/write RDMA access on a target machine using Intel DDIO to use this exploit. In the complex scenarios where Intel DDIO and RDMA are typically used, such as massively parallel computing clusters, malicious actors typically don't have direct access from untrusted networks.
Employing previously published best practices for side channel resistance in software applications and cryptographic implementations, including using constant-time style code, can mitigate the exploits described in this research.
More information can be found in Intel Security Advisory INTEL-SA-00290.
Affected Products:
Intel® Xeon® E5, E7 and SP families that support DDIO and RDMA.
Do you have a secure server room? Can anyone else physically access your servers? Are your USB ports shut down/disabled? Is your BIOS password protected?
If you don't have a secure server room for all of your intel machines and non approved people can physically access your servers then you're hosed.
If you have systems outside of the server room with server room level of access and active USB ports then you're hosed.
If you have all of that and the ports are disabled but the BIOS isn't password protected... then you're hosed.
Security is a picket fence where we need to pick and choose where our battles take place and where access's are prevented or allowed.
As intel continues to have vulnerabilities exposed the picket fences grow more gaps.
Yea to a home user some of these are eye-roll worthy. But if you work for a company with proprietary data (data being more valuable than Oil today.) and you need to control access to said data or risk devaluing your company, then these vulnerabilities ARE a big deal.
And Admins/Engineers/Managers and above that roll their eyes at these vulnerabilities should be fired and replaced with people that actually care.
So yet another vulnerability that requires local access. Stop the presses!
What other ass do you think they pulled that huge claimed IPC increase from recently?It's all a plan for them to say we fixed our cpu look at how much faster it is then past year model...1.1x faster but 3x as fast once you run all the patches on the old rig lol
What other ass do you think they pulled that huge claimed IPC increase from recently?
This vulnerability doesn't affect i7's...
The higher ups have already given me the order to phase out all Intel servers. So main Hyper-V servers are done just have to do the onsite AD/DNS servers next.
Does that make it better or worse?This vulnerability doesn't affect i7's...
Video of the latest high level meeting at Intel.
I just upgraded from a 3770k myself... to a 6800k. CPU was $170, RAM was $160, motherboard was free.Sheesh...Once all these patches and fixes that degrade performance are implemented, my 3770K is going to be so bogged down that I'll probably miss my dual P-III 1000 system.
This probably just sealed the deal for going with a Ryzen next spring when I overhaul my gaming PC.
Hyper-V servers are all running on 7551p’s now. My smaller onsite AD/DNS/DHCP servers will be replaced with the imbedded 3000 series epics. Don’t need a lot of power onsite anymore it makes administrating things way easier.Going Epyc?
Don’t most of these vulnerabilities require physical access to the machine? I can’t remember one that doesn’t but I don’t really pay attention to these. I was planning on having all AMD for a while so ignored the Intel side of things.
Don’t most of these vulnerabilities require physical access to the machine? I can’t remember one that doesn’t but I don’t really pay attention to these. I was planning on having all AMD for a while so ignored the Intel side of things.
I know the answer! It's the vulnerability monster?Intel is in bed with ______________