IT'S NOT OVER

IT'S NOT OVER

>As of 2018, almost every computer system is affected by Spectre, including desktops, laptops, and mobile devices. Specifically, Spectre has been shown to work on Intel, AMD, and ARM processors.

>While more difficult to utilize properly than Meltdown, Spectre may be much more challenging to defend against due to its generality. The original white paper even speculates that significant changes in microprocessor architecture might be needed in order to fully dispose of the problem.

>Since Spectre represents a whole class of attacks, there most likely cannot be a singular patch for it. While work is already being done to address special cases of the vulnerability, even the original website devoted to Spectre and Meltdown states: "As [Spectre] is not easy to fix, it will haunt us for a long time."

Other urls found in this thread:

youtube.com/watch?v=lR0nh-TdpVg
googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
twitter.com/NSFWRedditVideo

Yes it is, Spectre 1 already got patched and Spectre 2 is completely irrelevant since it's almost impossible to execute and doesn't even work on AMD, it was just thrown there to rope other CPU manufacturers into Intel's Meltdown even though it was entirely their fault and problem.

is my old ppc G4 mac mini safe?

This kills the x86. Yes, ARM is also affected, but if people need to buy new CPUs, they might as well switch archs.

nope

First gen Atoms are safe, stock em while you can.

You forgot to mention that to exploit spectre 1 on amd you need to have eBPF enabled which isn't normally done in production.

RISC-VS TIME TO SHINE

SPECTRE affects everyone and can let one process access another processes memory, but only at the same privilege level. Programs and kernels will have to modified to deal with it but it shouldn't have a major impact on performance.

MELTDOWN is Intel specific and lets programs access even the highest kernel privilege levels. Preventing it requires a major sacrifice in performance.

Spectre is literally nothing, despite the spooky name

What make Spectre spooky is that it's not gonna go away anytime soon.

It's also not going to do anything, because unlike Meltdown it can't let rogue javascript hijack your computer

Lmao so spooky though it was fixed on amd before any exploits were made

>significant changes in microprocessor architecture might be needed
they mean throw away intel and buy ryzen by this?

oh btw if you have intel cpu made before 2011-ish (ones before botnet) you are also vulnerable to universal root access by design

enjoy

youtube.com/watch?v=lR0nh-TdpVg

remember to thank intel

Will Raven Ridge desktop APUs be safe¿

No, the entire modern CPU-concept is fucked, as I understand it.

Same as summit ridge (safe)

What are the chances that consumer CPUs change architecture because of this?

Zero, apple might, but everyone else won't

>exploit spectre 1 on amd you need to have eBPF enabled
source?

googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html