So basically every processor is just fucked right?

So basically every processor is just fucked right?

So what we do now?

>tfw the NSA backdoors wasn't a meme

Other urls found in this thread:

github.com/Eugnis/spectre-attack/
googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
amd.com/en/corporate/speculative-execution
twitter.com/SFWRedditVideos

Every INTEL processor, my dear intelshill.

Wrong.

Incorrect.

Only Intel processors are vulnerable to meltdown which is the easier to exploit and more harmful and that causes perf drops with the patch. AMD and ARM are only vulnerable to spectre which is harder to exploit and, from what is know thus far at least, less harmful(but also unpatchable)

>spectre
>harder to exploit
github.com/Eugnis/spectre-attack/

You are mistaken.

>harder to exploit
>less harmful
Source?

I can't wait for the day that the IME is completely broken

Buy Intel®'s latest Core™ processor with an accompanying motherboard plus DDR4 RAM modules. Buy a new VGA too, just to be sure.

>less harmful
The project zero blog post.
googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Can't be patched, though.

Buy an ARM license with all Sup Forums, fix the bug in CPU design, produce this botnet-free CPU, I will be rich.

No. It is you who are mistaken, about a great many things.

>So basically every processor is just fucked right?
No

Variant 2 has been demonstrated on AMD hardware.

Source

so much for "harder to execute"

Don't need one.

Wrong. There are older CPUs without cache prediction. Afaik this kind of shit was introduced in Pentium 3 or so

Yeah just everything from intel after 1999

That prevents Meltdown, but what about spectre?

there's always a way in user...

nope, spectre describes a general flaw in the way processors have been designed for decades. any cpu with branch prediction may have an exploit

eat shit nvidiot

Okay I'm convinced

nice

Someone with an amd processor run this and see if it works

windows users BTFO this is why you use linux

enjoy your slow-down patches and exploits!

fuck yes please. it would ruin everything and make every intel cpu for the past decade impossibly insecure when it is finally broken but hopefully it would force intel's hand, or at least their profits down below. I dream for the day that awful company is bankrupt

>even arm wont save
FUCK

>tfw noone uses AMD

no, unfortunately I have an intel i7. hopefully linux's new memory table fixes some things. I don't know the exact details of the meltdown hack, but I think that better virtual memory separation of processes and of kernel/userland is a good thing no matter what.

How would that even make me a nvidiot anyway saying everything is fucked? I would more likely be an inshill in that case. That's what Intel is arguing right now, or more accurately just trying to throw AMD under the bus for meltdown even though they have nothing to do with it.

SERIOUSLY, how can I also shill for Intel here? I need money and aparently it is pretty easy, since literally 60% of this thread are shills.

That's Spectre 1 which is easily patchable with no performance loss, Spectre 2 is the hard one which is also hard to fix and doesn't affect AMD unless you change a setting for the sole purpose of making it vulnerable.
Get your facts right retarded shills.

Are you fucking retarded?

Linux got the planned obsolescence patch before Windows lel
Also it's a hardware exploit and the OS doesn't matter.

what the fuck
glibc is installed

please don't disparage the differently abled
and no, i have Ubuntu so i'm at least smarter than every others windows cuck :-)

forgot pic

>but also unpatchable
Nice try Brian:
>amd.com/en/corporate/speculative-execution
Variants 1 and 2 are part of the Spectre exploit, variant 3 is Meltdown.

font?

terminus

not sure what I'm supposed to be looking for here...I don't see the magic word in the output though

you compiled this right? what compiler and options did you use?

windows 10 patched out already, maybe yours already updated

>willingly installing exploits

Its literally one source file and you can see what it does pretty clearly

Says AMD

whatever the default for visual studio 2017 is for c/c++. No optimization, x64. I get a different result with a release config (no debugging symbols)

Open to suggestions

oh, duh

lmao

...

what... what am i looking at?

celery man

spectre is unpatched, kpti (or whatever is the windows equivalent) protects only against meltdown

neat

AMD rekt

Spectre 1 is patched and AMD isn't affected by Spectre 2.
This nomenclature is just one big PR ploy to rope AMD into this exploit fuckery even though it's not affected at all and won't have any performance loss either.

funtimes

from the github:
>In this example we're putting text "The Magic Words are Squeamish Ossifrage." in memory and then we're trying to read it using exploit. If system is vulnerable, you'll see same text in output, readed from memory.

so I am vulnerable to this attack on a Ryzen 1800x, Win 10 LTSB (ver 1607). Should also be noted I'm about 3 months behind on security updates, not sure if it's been patched since about to test.

update and retry

Should also write a quick program that makes lots of sys calls and see how long it takes before and after updating

>Every INTEL processor, my dear intelshill.
hey nigger, the O.G. Pentium 1 is immune, along with Itanium and most older Atom processors.

>Afaik this kind of shit was introduced in Pentium 3 or so
It was the Pentium Pro/2 that introduced Out of Order and speculative execution.

>#define sscanf_s sscanf

I am glad I have some older computers lying around. I know for sure, I have at least one intel cpu that is pre-jewery.......
Definitely glad I moved my server over to an amd cpu powered tower a week before the news dropped..

AMD doesn't have this problem.

Linux added the nopti kernel parameter to disable it on boot idiot.

You can't escape the botnet. Open source firmware, OSes, and software won't solve the problem. You can try using network isolation, but have fun with airgap hacks... The only solution is the wrap yourself in tinfoil and hide in a faraday cage.

>all the cpus made to run with w7 are all fucked
>don't want to buy modern cpu nor downgrade to botnet 10
Perhaps it's time for me to unplug the Internet cable

Try again champ.

Yes it does
back to you

...

>everything I dont like is Sup Forums

garbage table, author should kill themselves immediately

>I don't like it so its wrong REEEEEEE!!!
mmmk :^)

Just updated windows and I'm still vulnerable, I get the same results.

But I'm on AMD and am affected, see:

And I'm on windows so is wrong too.

Or the github code that was linked by is wrong.

So wait, are all machines already going to feel the slowdown?
How do we tell if our machine is patched or not?
Is leaving the machine unpatched a viable option?

1995, my dear friend

Is spectre 1 for amd on linux fixed with the nopti boot param. ?

Lately, yes actually