>As of 2018, almost every computer system is affected by Spectre, including desktops, laptops, and mobile devices. Specifically, Spectre has been shown to work on Intel, AMD, and ARM processors.
>While more difficult to utilize properly than Meltdown, Spectre may be much more challenging to defend against due to its generality. The original white paper even speculates that significant changes in microprocessor architecture might be needed in order to fully dispose of the problem.
>Since Spectre represents a whole class of attacks, there most likely cannot be a singular patch for it. While work is already being done to address special cases of the vulnerability, even the original website devoted to Spectre and Meltdown states: "As [Spectre] is not easy to fix, it will haunt us for a long time."
Yes it is, Spectre 1 already got patched and Spectre 2 is completely irrelevant since it's almost impossible to execute and doesn't even work on AMD, it was just thrown there to rope other CPU manufacturers into Intel's Meltdown even though it was entirely their fault and problem.
Wyatt Foster
is my old ppc G4 mac mini safe?
Joshua Roberts
This kills the x86. Yes, ARM is also affected, but if people need to buy new CPUs, they might as well switch archs.
Gavin Robinson
nope
Carson Rivera
First gen Atoms are safe, stock em while you can.
Jeremiah Torres
You forgot to mention that to exploit spectre 1 on amd you need to have eBPF enabled which isn't normally done in production.
Matthew Moore
RISC-VS TIME TO SHINE
Sebastian Anderson
SPECTRE affects everyone and can let one process access another processes memory, but only at the same privilege level. Programs and kernels will have to modified to deal with it but it shouldn't have a major impact on performance.
MELTDOWN is Intel specific and lets programs access even the highest kernel privilege levels. Preventing it requires a major sacrifice in performance.
Christopher Diaz
Spectre is literally nothing, despite the spooky name
Benjamin Collins
What make Spectre spooky is that it's not gonna go away anytime soon.
Jose Allen
It's also not going to do anything, because unlike Meltdown it can't let rogue javascript hijack your computer
Isaiah Smith
Lmao so spooky though it was fixed on amd before any exploits were made
Nolan Perry
>significant changes in microprocessor architecture might be needed they mean throw away intel and buy ryzen by this?
Jayden Clark
oh btw if you have intel cpu made before 2011-ish (ones before botnet) you are also vulnerable to universal root access by design