There is NO speculation execution vulnerabilities in Zen

None at all. AT-FUCKING-ALL.
It's just physically impossible due to Zen's very structure of the architecture. Don't fall into believing BS FUD produced by random shitheads on internet. There are NO vulnerabilities in Zen.
For more info see this:
youtube.com/watch?v=qgiUuTmXyGs

Other urls found in this thread:

blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
techpowerup.com/235092/intel-says-amd-epyc-processors-glued-together-in-official-slide-deck
cnbc.com/2017/12/19/intel-ceo-in-memo-we-are-going-to-take-more-risks.html
cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html
forums.dolphin-emu.org/Thread-unofficial-new-dolphin-5-0-cpu-benchmark-results-automatically-updated--45007
twitter.com/nicoleperlroth/status/948684376249962496
en.wikipedia.org/wiki/Meltdown_(security_vulnerability)
youtube.com/watch?v=qgiUuTmXyGs
kb.cert.org/vuls/id/584653
twitter.com/NSFWRedditGif

...

Too much conflicting shit about AMD. It's either affected by 1 of the vulnerabilities or none of them, with reputable people disagreeing.

Delid this

It's not affected by Spectre 1 as that one is executed strictly on Operating System's side, which means that security patches should be provided by OS maker and it has nothing to do with AMD. Even if someone tries to attack Zen through Spectre 1, it's downright impossible because Zen's SEV automatically blocks any attempts at accessing ring 0 from ANYWHERE. Basically what this means is that SEV fully protects from BOTH Spectre 1 and Spectre 2 right out-of-the-box. Literally fucking FLAWLESS and ABSO-FUCKING-LUTELY IMPENETRABLE.

Fight your Intel urges user

Even if Zen has the extra protection, if it's an OS level thing and security patches should / can fix it, why is it labeled as "not possible" for Intel?

it's not affected by meltdown which is the only one that matters

because AMD is shit and can't even multi-thread

fucking lol

>why is it labeled as "not possible" for Intel?
Because Inturd Core i series' very structure, which is monolithic as fuck, allows that. Zen is not one single ring 0, it's several separate modules (think like QubeOS, but a CPU), while Inturd's trash is STILL one single module even up to this very day. Jews fucked up big-time and now they'll suffer for their arrogance. Gas and burn the kikes, I say. Fuck 'em. Fuck 'em good.

It's not affected by ANYTHING. Meltdown, Spectre 1 & 2, doesn't matter - SEV provides ABSOLUTE projection for Zen's ring 0.

it chip specific hack, intel/Microsoft/linux need to make custom setting for each chip

All of this seems like fear mongering. If the most worrisome method of attack for the normal user would be some malicious javascript ad or whatever, browser updates would probably be enough to make most people safe enough.

...

>There are NO vulnerabilities in Zen.
False.

There aren't any known ones directly related to this.

blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

>like QubeOS, but a CPU
that's orgasmic

Still stuck on FX era?

>autism, the post

He's not wrong tho...

Intel Cucks trying to pathetically defend themselves, it's over, just fucking give up.

AMD is superior, Apple Ax is superior,

Does anybody know if iphone is affected?

Post MFW/TFW/YFW fucking FAILDOZER makes a SUDDEN comeback out of nowhere and is BETTER than ALL of the TRASH Inturd shitted out in the last 10 years WHILE being super-cheap now
>MFW AMD fully and completely foreseed this, MFW AMD planned this all along, FOR ALL THESE YEARS

he's also a faggot, go suck his dick why dont you

I disagree with varient 3, you can use a times JS to effectively DOS attack the hardware forcing the cache dumps to cost the system a fuckton of performance while being able to slip in dirty code and pull sensitive data. Other than that yes everything is fine.

This isn't going to end well for Intel is it? I went from FX to Ryzen. I don't really feel this issue as much as people with Intel I'd imagine. Although my server has an Intel Pentium in it. Time to get an R3-1200/am4 setup going.

--> . Video. Watch it.

You must just be here for the shitposting because everything you are saying is retarded. On the most fundemental level everyone knows nothing is totally secure.

>Time to get an R3-1200
Too weak, literal homeless bum tier. 1400 and Zen APUs are the very bare minimum you should go these days.

>it's all just a ploy to get intel stocks down and AMD stocks up
>from now on this type of cyber disinfo warfare will be common place in tech because people made trillions on it from bitcoin
>bitcoin was a huge fucking test to get normies into stocks


It doesn't or within margin of error (

Disinfo works on the simple minded. If only intel were as good at security as they are at bullshitting.

>everyone knows nothing on Intel's side is secure

Intel shill try this hard

here fact
Intel also got Milion more unknown vulnerabilities.

My main build is an r7-1700X. I just need a low power solution to power my file/print server.

>intel
>inplying

They're not even any good at bullshitting, as literally no one believed in this techpowerup.com/235092/intel-says-amd-epyc-processors-glued-together-in-official-slide-deck lame retarded 12-year old tier garbage shit

AMD shill haha this is weak, check out this

here fact incoming
AMD got a Bilion unknown vulnerabilities but just like Linux, nobody cares because market share

>AMD got a Bilion unknown vulnerabilities
show me some then?

and someone will post a pdf about a pile of intel cpu bug

>nobody cares
Fake news, you care. that make your statement false

Intel may have licenced the superior AMD64 ISA but they obviously don't have the skill to implement it securely. Stick with the original inventors, only AMD.

Why are you even responding to him? He's absolute Intbecile, literal ostrich-brained victim of Jewish trickery and kike marketing.

reddit: the post

>hurr durr technuqally corect

>Stick with the original inventors
Remember that time long long ago when AMD literally began as a company by stealing Intel's designs and copy-pasting (essentially pirating) Intel processors? Those were some top-notch dank memery days, indeed.

>point out real world common knowledge accepted by entire security industry makes me an intel shill
Your autism is amazing user

If I care, why am I not randomly knocking AMD cpus to look for problems? See I don't care! Now stop bothering me shudra.

>Intel CEO to employees: 'We are going to take more risks'
cnbc.com/2017/12/19/intel-ceo-in-memo-we-are-going-to-take-more-risks.html
>Intel's CEO reportedly sold shares after the company already knew about massive security flaws
cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html

Soo this is what he meant, lmao

quit trying to minimalize the damage and divide victims.
Home virtualization is at an all time high. Many people here have multiple virtual machines and vps running at this very moment.
This affects everybody either directly or indirectly.

Only thing I want to know is how ARM is even related to this shit.

Wasn't there a project where AMD worked with ARM? Those are invulnerable.

Well what I've read is that ARM is also vulnerable but how?? Makes to damn sense to me.

>Wasn't there a project where AMD worked with ARM?
Yes. It's called Zen, lul. However, by itself ARM, when not being contracted by AMD, is not even remotely close to being as good.

K12 was to be a 2-part design, desktop x86 and an ARM core, the ARM side was dropped after it was realised it was pointless

Zen uses ARM cores. But these are highly customized and altered cores, so they're absolutely not same as ARM's mobile cores. ARM has potential security vulnerabilities in it's mobile core segment, and that has nothing to do with Zen.

Can the poor anons afflicted with patched Intel systems run this benchmark? Post results.

forums.dolphin-emu.org/Thread-unofficial-new-dolphin-5-0-cpu-benchmark-results-automatically-updated--45007

just a reminder.

He's Transferring his money to bank of Israel right now

Linus already freed AMD from the custody, you slowpoke. Only Intel gets fucked in all holes from now on.

>Zen uses ARM cores
This fucken guy.

It's literally 14LPP, matey.
Same shit as what ARM makes in mobile.

this is exactly what is on the code, do you even C?

Ryzen is vulnerable to spectre1. The only cpu where the PoC i have *didn't* work, was FX8350.

$ ./150696aaaff98d3e.spectre
Reading 40 bytes:
Reading at malicious_x = 0xffffffffffdfed88... Success: 0x54=’T’ score=2
Reading at malicious_x = 0xffffffffffdfed89... Success: 0x68=’h’ score=2
Reading at malicious_x = 0xffffffffffdfed8a... Success: 0x65=’e’ score=2
Reading at malicious_x = 0xffffffffffdfed8b... Success: 0x20=’ ’ score=2
Reading at malicious_x = 0xffffffffffdfed8c... Success: 0x4D=’M’ score=2
Reading at malicious_x = 0xffffffffffdfed8d... Success: 0x61=’a’ score=2
Reading at malicious_x = 0xffffffffffdfed8e... Success: 0x67=’g’ score=2
Reading at malicious_x = 0xffffffffffdfed8f... Success: 0x69=’i’ score=2
Reading at malicious_x = 0xffffffffffdfed90... Success: 0x63=’c’ score=2
Reading at malicious_x = 0xffffffffffdfed91... Success: 0x20=’ ’ score=2
Reading at malicious_x = 0xffffffffffdfed92... Success: 0x57=’W’ score=2
Reading at malicious_x = 0xffffffffffdfed93... Success: 0x6F=’o’ score=2
Reading at malicious_x = 0xffffffffffdfed94... Success: 0x72=’r’ score=2
Reading at malicious_x = 0xffffffffffdfed95... Success: 0x64=’d’ score=2
Reading at malicious_x = 0xffffffffffdfed96... Success: 0x73=’s’ score=2
Reading at malicious_x = 0xffffffffffdfed97... Success: 0x20=’ ’ score=2
Reading at malicious_x = 0xffffffffffdfed98... Success: 0x61=’a’ score=2
Reading at malicious_x = 0xffffffffffdfed99... Success: 0x72=’r’ score=2
Reading at malicious_x = 0xffffffffffdfed9a... Success: 0x65=’e’ score=2
Reading at malicious_x = 0xffffffffffdfed9b... Success: 0x20=’ ’ score=2
Reading at malicious_x = 0xffffffffffdfed9c... Success: 0x53=’S’ score=2

>near zero
that's not zero

Bullshit.
PR Bullshit.

AMD is affected and it's a fundamental flaw in the original AMD64 design. Intel just added icing to the cake, making them vulnerable to "Meltdown" too.

For a quick rundown, read
twitter.com/nicoleperlroth/status/948684376249962496
Then, check the papers.
Spectre (aka affects ALL vendors, including AMD, and has NO FIX. Everyone is affected by CVE-2017-5753 and CVE-2017-5715.

Please stop spamming that horribly incorrect info-graphic.

Linus gave up and officially paroled AMD yesterday. AMD is being excluded now.

Stop spreading FUD BS, kid.
Spectre 1 is even easier to deal with than Spectre 2, and AMD's SEV already completely protects Zen from Spectre 2. Neither Spectre 1 nor Spectre 2 won't work jack shit on Zen.

0/10. You need to try way harder than just that, kid.
People aren't as dumb as you are to be swayed by such blatant BS FUD fake news you're spreading here.

That fix addressed only "Meltdown", it makes sense to reserve it to Intel CPUs.

>I'll just namecall him pretending to be a big boi and I'll keep avoiding any actual independent and/or academic source

I did not expect anything different. It can't be helped

Spectre 2 and Meltdown are same kind of internal attacks, attempts to access ring 0. Zen is absolutely impenetrable to both of them due to SEV. They can't do jack on Zen.

Nice non-argument, kid. At least you tried.

>Spectre 2 and Meltdown are same kind of internal attacks
No, they're not. Read the fucking papers or press reports or the academic findings. You're mixing AMD unfounded speculations and wishful thinking.

>lelele kid
>I'll namecall again, it worked so fine!!!11
Read the fucking source or the independent report I kindly linked for mentally challenged individuals like yourself.
I can't force you to educate yourself, that's up to you.

>academic findings
KYS, fuckwit.

>However, for both ARM and AMD, the toy example as described in Section 3 works reliably, indicating that out-of-order execution generally occurs and instructions past illegal memory accesses are also performed.

AMD is vulnerable, there just isn't a specific implementation that targets them yet.

Proofs? Show me benchmarks.

>Intel garbage gets gimped by up to 67% in performance
>goes behind Bulldozer
>Give me proofs
Can't you just count? Not even on fingers?

Those academics were the ones who disclosed the vulns you brain dead cocksucker gtfo

>isn't a specific implementation that targets them
So - completely invulnerable, then. And there won't be any "specific implementations" as SEV absolutely impenetrable security measure.

and people can still find way hack intel even after patch.

Until it got hack it none issue

If its executing instructions past illegal memory accesses then its not completely invulnerable at all.

>due to SEV
you don't even attempt to hide the very simple fact that you got no fucking clue. SEV is for datacenters and host hardening, it won't change a single thing for single hosts and for each VM. At best, a compromised VM won't allow to compromise the host and other VMs in an unpatched Xen/OpenVZ6/Docker scenario. It may help. But it won't defuse Spectre. Sure it may help in making containers... contain again.
>Spectre 2 and Meltdown are same kind
That's an undue and dangerous over-simplification. They are both attacks leveraging the same logic, but they are absolutely not the same attack and they are not even leveraging the same CPU features. The attack dubbed as "Meltdown" is maybe easier to implement and it's what patches are for.

>So - completely invulnerable
you weren't the smartest guy in your class, right?

>you can use a times JS to effectively DOS attack the hardware
blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

>SEV
pls staph, you don't know what SEV is and what it is for, we got it.

It's been SHOWN to affect AMD, you fucking morons.

>executing instructions past illegal memory accesses then
It can't be done when SEV is there. Such attempts get cockblocked immediately on spot.

en.wikipedia.org/wiki/Meltdown_(security_vulnerability)

>He trusts anything Google shitposts out
KYS.

No they don't, all that adds is a layer of encryption overtop the data, they're still getting the data its just encrypted, and encrypted data can always eventually be unencrypted.

It sounds like you have literally zero clue what you are talking about.

>6.4 Limitations on ARM and AMD
>We also tried to reproduce the Meltdown bug on several
>ARM and AMD CPUs. However, we did not manage
>to successfully leak kernel memory with the attack de-
>scribed in Section 5, neither on ARM nor on AMD.

>No they don't
youtube.com/watch?v=qgiUuTmXyGs
>they're still getting the data
They don't and they can't. See video above. They can't scrape shit.

You are a fucking lamer, kid.

>reputable
maximum damage control
what saddens me is that the likes of reuters are reporting according to intel's spiel, i.e., the ambiguous phrasing that makes it appear that all is lost on euqal terms for every cpu in the world but with plausible deniability that you didn't read it right and should take into account the peculiarities involved, which they conveniently didn't expand on.

Intel press release must have been written by a dual major in law and PR, a spawn from hell.

intel mkting probably went like:
>oh god we fug, wat do
>we have to make an official statement asap but that will doom us all
>us all
>intern says
>you know that issue that is an open secret to chip´makers, a hard to tackle problem technically but has negligible valid risks and thus no has ever bothered to fix yet?
>yes
>why don't we throw it into the release to muddy the waters, so we can plausibly drag both amd and arm names along with us in this mess?

Not dropped officially but it's been put on hold in favor of Zen. They were apparently going to revive it in the future for low power microservers and stuff at some point.

Please educate yourself on what SEV is. See and for pointers.

AMD is vulnerable in every and all Spectre-related advisories and papers.
kb.cert.org/vuls/id/584653 is just the latest addition.

Sup Forums goes to Sup Forums
they spot a shill from a mile away, they effortlessly and intuitively simply sense a larper, they catgorize every fallacy correclty, including all of those outside the sticky, get bored with their overall lack of inteligence and come back to
Sup Forums on Sup Forums
where they eat up press releases, paid advertisements disguised as real pieces, rumors and acour the net to find each 1k subscriber moron on youtube, each 10 replies posts on plebbit, every fora, to revalidate their particular brand of confirmation biases.

>AMD is vulnerable in every and all Spectre-related advisories and papers.
Google says otherwise.

oshit, that was the meltdown vulnerability that actually matters, nvm lol

No, it doesn't says otherwise. Read the whole thing.

...

Until someone in the security community actually clarifies how AMD and ARM are affected by Spectre and proposes a fix I'm going to assume it's bullshit to deflect from Meltdown which is apparently a considerably more serious problem anyway.

>muh SEV
Hahahahaha Sup Forums

NO. PHYSICALLY. IMPOSSIBLE.