I-it affects AMD t-too goy!

>i-it affects AMD t-too goy!
Shills are in maximum overshill tonight

Other urls found in this thread:

meltdownattack.com/
youtube.com/watch?v=4hphXA-Ehuw
businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1
twitter.com/NSFWRedditVideo

Your Arm chip also effected, intel goin full shill now

It does though.

Show me a non-jewish source

take it to pol, tks.

meltdownattack.com/
Look at "Spectre"

It affects AMD but is no where near as severe as intel though.

only in linux

t.schlomo intelstein

nice "source", moron

Also only fx pro and Apu line is affected by specter 1

LMAO
Go Blue Team!

So if I notice a (((coincidence))) I must be a Nazi? Great mental gymnastics you got there bro.

>Shills are in maximum overshill tonight
haha yeah they are, it's definitely entertaining.

are you a Nazi?

delet

No I'm Hitler

LOL this. seeing it in every thread, its probably one butthurt intel shill

That's not good

Really? I've heard Ryzen was affected, but I can't confirm that source.

the source is from intel, what expected

I'm seeing the exact same fake news pics and sentences being posted in every single thread, intlel shills aren't even trying to be subtle anymore.

But yet everyone shills about it in the threads about Meltdown (the one that doesn't affect AMD)

Oh yea, they must paying out big bucks to lump all these exploits together. That way they can make it out that they're being picked on. "We're all affected guys."

Mind you, AMD hasn't come out and straight up said "We're safe" yet which makes me wonder if they're still looking into it.

>Mind you, AMD hasn't come out and straight up said "We're safe" yet which makes me wonder if they're still looking into it.

Spectre V1 and Meltdown are 100% safe.
Spectre V1 requires a patch, no impact on performance.
Meltdown can't touch them at all, no fix needed.

Spectre V2 is

If you read what they say its "near zero" and "absolutely zero". By all accounts the performance-robbing one is the one they are completely safe from, though.

>Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.

oof

Spectre is insanely difficult to exploit, and impossible to patch; so no performance drops.

Meltdown (which only affects Intel) is easy to exploit, incredibly dangerous, and patching it means a 30% performance hit.

It's compiled from project zero paper

youtube.com/watch?v=4hphXA-Ehuw

>tfw the botnet doesn't want me to fly

Spectre and Meltdown are both needed to exploit.
Meltdown can only read data while Spectre can inject data.

So AMD is also safe from Spectre?

You don't need to write data to steal information.

Spectre by itself is not a major threat, it's software patchable with little perf penalty, and difficult to exploit.

Meltdown is a huge problem. AMD doesn't have the Meltdown problem. That quoted sentence seems like they want to imply that AMD is as fucked as Intel, but if AMD is free from Meltdown, then it should be in the clear.

Sure, if you want to steal and nothing else, then Meltdown is perfect tool for that, but if you want to inject something, then both of the exploits are necessary
so far, nobody has provided any proof that you can inject data to AMD, if it's safe or not is to be seen.

businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1

HAAAAAAAAAAAAHAHAHAHAHAHA

>huge problem
Do you run servers or virtual machine? Exploits are always been found and patched dude. You do you care now?

Why do you*

This isn't specific to either of those though. The flaw is with virtual memory not virtual machines

Used to be only on linux
Not anymore

doesnt this count as insider trading?

is my 3570k gonna be okay?

Are you imbecile or what? What part you cannot understand? EVERY Intel processor from the past 10 year is effected. C2D, i series, most of the Atoms. Would you need to worry? Yes, you would, because a browser with enabled javashit can steal data from kernel space (crypto keys, passwords, everything). Will the os patch correct this? Yes it would, but with performance penalty. AMD effected? Yes, and no. It can be if programmers don't exclude AMD processors from the patched code.

:(

Wouldn't that require the browsers to allow for that?
I mean, wasn't this what rust is supposed to mitigate? (Not allow overflows and not have undefined behavior)

>under non-default kernel setting

The exploit was demonstrated with javascript. No sandbox or a VM can protect you from hardware design flaws.

what u be sayin is, is that I have the freedom to fuck my shit up? wooooooow free software wins again

for you

So hypervisors are vulnerable or just guests OS?

i'm not sure if i can trust that nose.

I'm new to the party what's the uproar about?

...

>Affected by meltdown
>YES
>Fix
>Performance degrading software

yup suck to be intel

>4Jew

is this the reason Intel's processors are faster than AMD's?

ayy

Yes it does, because he sold shares before secret information that can affect share price went public. It's the same thing as if he dumped his stack before a negative quarterly report.

Oy vey! Oy gevalt! The Chutzpah of these Goyim! This is anudda shoah! By the Protocols! Alert the Elders! Get Mossad! The Goyim Know! Shut it Down!

>software gimping
i think so