Seneste forumindlæg
Køb / Salg
 * Uofficiel Black/White liste V3
Login / opret bruger

Forum \ Hardware \ Processor
Denne tråd er over 6 måneder gammel

Er du sikker på, at du har noget relevant at tilføje?

Intel har stadig sikkerheds problemer

Af Monster Supporter Thomas8 | 05-03-2019 16:59 | 1662 visninger | 6 svar, hop til seneste
Fatter stadig ikke, at de ikke har fikset det? "'Leakage ... is visible in all Intel generations starting from first-gen Core CPUs" By Thomas Claburn in San Francisco 5 Mar 2019 at 06:34 https://www.theregister.co.uk[...]
--
Hvorfor klør kvinder sig i øjnene, når de vågner om morgenen? Fordi de ingen nosser har :O

--
Sidst redigeret 05-03-2019 16:59
#1
Thomas8
Monster Supporter
05-03-2019 17:12

Rapporter til Admin
"The issue is separate from the Spectre vulnerabilities, and is not addressed by existing mitigations. It can be exploited from user space without elevated privileges." "Intel is said to have been informed of the findings on December 1, 2018. The chip maker did not immediately respond to a request for comment. The paper's release comes after the 90 day grace period that's common in the security community for responsible disclosure.Moghimi doubts Intel has a viable response. "My personal opinion is that when it comes to the memory subsystem, it's very hard to make any changes and it's not something you can patch easily with a microcode without losing tremendous performance," he said."So I don't think we will see a patch for this type of attack in the next five years and that could be a reason why they haven't issued a CVE." "
--
Hvorfor klør kvinder sig i øjnene, når de vågner om morgenen? Fordi de ingen nosser har :O
--
Sidst redigeret 05-03-2019 17:14
#2
Sven Bent
Semi Nørd
05-03-2019 17:15

Rapporter til Admin
Igen ligesom spectre og meltdown er det ikke et problem for almideligt single bruger system i hjemmet Issuet ligger i multibruger og multioOSsystemmer aka server situationer Det eneste angrebsvinkel jeg kan see fra en "fremmed" er via java script. Men de fleste nyere browser har allerede random timer tics til at besvaergeligoere denne slags angreb
--
Sven Bent - Dr. Diagnostic www.TechCenter.[...] - Home of Project Mercury
#3
fishie
Giga Supporter
05-03-2019 22:39

Rapporter til Admin
#2 Nu er det nok også de færreste hjemme brugere som går "nok" op i sikkerhed til at bekymre sig om dette. Tag derimod de store server farme, cloud setups etc som kører på Intel hardware, det er dem som bliver ramt og det er desværre også der (For intel) at pengene er.
--
CPU:i7-6700k GFX: GTX1060 HDD MAIN: 2xSamsung 950Pro 512GB (Raid0) Storage: 24x4TB + 24x3TB + 40x8TB JBOD
#4
Bundy
Mega Supporter
05-03-2019 23:10

Rapporter til Admin
#3: Arh. About two thirds of the revenue stems from the PC Client Group, which generated $9.2 billion over Q3 2014. The Data Center Group brought in $3.7 billion, while the Internet of Things group and the Software And Services groups each brought in about half a billion in revenues. 2/3 dele af deres indtægt er fra "PC" markedet, i 2014 tal.
--
Hvis du kan læse dette, har du tabt.
--
Sidst redigeret 05-03-2019 23:10
#5
fishie
Giga Supporter
05-03-2019 23:32

Rapporter til Admin
#4 I 2014 ja.. Der er mangel på Intel chips lige pt da der er stor efterspørgsel efter mere udstyr til datacentre da væksten er eksploderet på den front. Der er en grund til at AMDs primære fokus med ZEN har været deres EPYC serie rettet imod server markedet.
--
CPU:i7-6700k GFX: GTX1060 HDD MAIN: 2xSamsung 950Pro 512GB (Raid0) Storage: 24x4TB + 24x3TB + 40x8TB JBOD
#6
Thomas8
Monster Supporter
06-03-2019 05:46

Rapporter til Admin
Efter Forbes skrev om det svarede intel: UpdateAfter initial publication, an Intel spokesperson provided this statement: "Intel received notice of this research, and we expect that software can be protected against such issues by employing side channel safe software development practices. This includes avoiding control flows that are dependent on the data of interest. We likewise expect that DRAM modules mitigated against Rowhammer style attacks remain protected. Protecting our customers and their data continues to be a critical priority for us and we appreciate the efforts of the security community for their ongoing research." In plain English, I think Intel is laying the blame for Spoiler on software developers who don’t follow “side channel safe software development practices”, and manufacturers of memory modules that have not “mitigated” against this kind of attack. In my view, if Spoiler was entirely due to sub-par software and memory modules, it would affect AMD processors as well. Intel’s statement does not change my take on this news. https://www.forbes.com[...]
--
Hvorfor klør kvinder sig i øjnene, når de vågner om morgenen? Fordi de ingen nosser har :O
--
Sidst redigeret 06-03-2019 05:47

Opret svar til indlægget: Intel har stadig sikkerheds problemer

Grundet øget spam aktivitet fra gæstebrugere, er det desværre ikke længere muligt, at oprette svar som gæst.

Hvis du ønsker at deltage i debatten, skal du oprette en brugerprofil.

Opret bruger | Login
NYHEDSBREV
Afstemning


ANNONCE