AMD REKT AMD REKT AMD REKT

13 CRITICAL SECURITY VULNERABILITIES DISCOVERED IN AMD SECURE PROCESSOR

I REPEAT

13 CRITICAL SECURITY VULNERABILITIES DISCOVERED IN AMD SECURE PROCESSOR

youtube.com/watch?v=BDByiRhMjVA

amdflaws.com/

Attached: ym2h6f9kthj01.jpg (293x293, 17K)

Other urls found in this thread:

safefirmware.com/amdflaws_whitepaper.pdf
finance.yahoo.com/m/5eb8dd7a-988c-342a-af0b-59137530a2ff/amd-stock-falls-after-report.html
twitter.com/cynicalsecurity/status/973591954096381952
twitter.com/AnonBabble

NOOOOO THIS CANT BE REAL AMDBROS

Attached: 1517379575281.jpg (700x393, 41K)

>trusting amdflaws.com without any factual proof
Boy

JIM KELLER A HACK, HACK!

>Ryzenfall
kek

>intel rekt
>amd shrektified

Is there no good option anymore?

cts-lab doesn't have white paper for Intel? Not a single mention? For a newly founded company last 2017 in Tel Aviv? Nose knows.

RYZENFALL AHAHAHAHHAA

safefirmware.com/amdflaws_whitepaper.pdf
FUCKING REKT

>Wikipedia as a source in a whitepaper
Fucking dropped

See Also:
>The researchers gave AMD less than 24 hours to look at the vulnerabilities and respond before publishing the report. Standard vulnerability disclosure calls for 90 days notice, so companies have time to address flaws properly.
>The report and all statements contained herein are opinions of CTS and are not statements of fact. Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports.

Yeah, I was going to say this seems like some serious propaganda. Would not be surprised if Intel funded this. What kind of security researcher builds a website with infographics and shit? This is hilarious.

arm

Dont most make sites about exploits they've found? I've seen a few over the years. Meltdown and spectre have a site.

b-but AMD said they are secure processors!!!!!! Nooooooooo!

>ryzenfall-4
>code exectution on amd secure processor
post hashrate

>CTS-Labs, an Israeli security company

finance.yahoo.com/m/5eb8dd7a-988c-342a-af0b-59137530a2ff/amd-stock-falls-after-report.html

AMD is finally dead :)

> >RYZENFALL: Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
> >FALLOUT: Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
> >CHIMERA: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.
Hey, it's still worth it, since it allows to access protected systems with the help of an employee who services those systems. You can disagree with me since the system is compromised anyway in this case, however the malware here will persist in the system even after a full reinstall and won't be detected by the usual means.

>CTS-Labs, an Israeli security company
>israeli

This is a win for everyone
think about it

they usually release technical info on the vulns, and they release it after informing the vendors and giving them 90 days to patch their vulns.

Jews posting fake news?

i wonder who is beind this

UMA

Attached: been.png (207x297, 80K)

Attached: Holy+i+didn+t+have+that+one+_27f4ea5616d2dbe9b98e1e04f0cfb675.png (200x200, 26K)

twitter.com/cynicalsecurity/status/973591954096381952

Attached: rekt.png (545x292, 39K)

FX-8350 doesn't have this problem

Attached: 193459834985.jpg (253x229, 19K)

Sup Forums and AMDpoors both BTFO in one day???

IT MUST BE MY BIRTHDAYYYYY :DDDDD

> This is a whitepaper worthy of an ICO
> Initial Coin Offering
> Shitcoin
> Incompetent ponzi scheme
Cryptofags BTFO

Attached: 1518581667854.jpg (403x395, 19K)

UMA SOPA DELICIA

Attached: 1504275173842.png (480x521, 120K)

>All of the exploits require elevated administrator access, with MasterKey going as far as a BIOS reflash on top of that.

Are these actual critical vulnerabilities? Something about this seems odd

lol @ this hit job

Attached: 1518582774152.gif (200x200, 1.89M)

This is a fake article made to push amd stock down.

The names weren't even well thought up.

no. they are intel shill and (((people))) trying to crash the amd's stock. these "critical vulnerabilities" require flashing the motherboard, have digital signed drivers, full privilege access to the computer. it is a big nothing burger.

>the absolute state of inteltards to believe this shit is worth anything
Oh boy, so spooked that mr.hacker is going to break down into my house and flash my bios while I'm at work!

How many times does this have to happen before they realize including stupid management engines or hidden security CPUs is a disaster.

>make up random vulnerabilities that require PHYSICAL ACCESS TO THE HARDWARE in order to actually work
>set up a neat looking website, whitepaper that reads like a financial briefing with no technical details
>brief the media before the affected company, give them less than 24 hours to work out what's going on
>set up short positions on the company's stock
>let the news outlets roll out the info while you laugh all the way to the bank
I mean, it's risky, but as soon as one outlet takes the bait and misinformed users start running around like headless chickens, it actually works.

yep
obv to lower stocks$

t. Didn't read that this is entirely a hit piece
If someone has access to an elevated account on your computer along with enough time to flash the BIOS just to exploit your CPU then you have far larger issues to worry about.
This entire write-up, if you can even call it that, is a pathetic jab with unrealistic, theoretical conditions. Perfect storm magnitude.

>Persistence at a hardware level only requires user to run as admin
>No way to get rid of it once it executes
I hope you realize that 0day gets chained, they get rce in some shit server running on the box, use a privilege escalation (Linux has these constantly), and now they're able to persist forever at a layer the os has no insight into

Attached: Screenshot-2018-1-5 Intel CEO We think of ourselves as an Israeli company as much as a US company.pn (398x515, 16K)

Attached: 1520963886286.jpg (1910x1000, 231K)

Still implies running software at an elevated level to exploit. Sure, it can definitely get retarded users, I'll give you that.
And yet, such exploit is yet to be proven, as there are no technical details whatsoever and the whole operation was done in a very irregular way for InfoSec standards.

>3 of them require elevated privileges
>one requires flashing another bios
>"lol these are just opinions and not statements of fact, like we think it's true"
>"we might or might not have economic intentions"
simply ebin

Attached: 1517249374045.jpg (660x660, 55K)

Well done you got the joke

Same Intel shill

>The report and all statements contained herein are opinions of CTS and are not statements of fact.

Attached: retard.png (593x619, 708K)

Even if AMD processors had security vulnerabilities, which sounds like a hallucination, they probably did not put them there on purpose unlike Intel

What makes a man a shill for free? What sad path in life did you take?

>need admin right to exploit
please just kill yourself

It's a hoax, everyone go home.