Oh look!

Oh look!
AMD fixed their CPUs without slowing them down.

community.amd.com/community/amd-corporate/blog/2018/03/21/initial-amd-technical-assessment-of-cts-labs-research

Intel BTFO!

Attached: link_kJJDdGMZ4UdvmV5BqyjhUGMe51fBwWSB w300h223.jpg (300x223, 9K)

>amd confirms they actually did have vulnerabilities
>Patch only fixes some of them
Confirmed for the full patch causing slowdown.
AMD is truly going to be on suicide watch

>point of vulnerability is the secure processor
Oh the irony. Nevertheless the architecture itself seems to be secure.

are these the same ones that amdrones were claiming were fake?

Yup.

Are you retarded? They literally covered all the "vulnerabilities" reported by CTS Labs as patched by future bios updates.

>If you install malicious software as administrator it may fuck your shit up
I never would have known

Attached: Capture.png (439x790, 44K)

Nobody said they were fake
Everyone said that CTS labs was doing some shady shit by listing these things as “vulnerabilities” when in reality they were literally nothing. So much nothing and even though they only gave AMD less than 90 days to respond they patched them in a couple days.

see

>Nobody said they were fake
Many said that. You just chose to ignore them.

What's more strange about these bugs is they would appear to apply to many more systems outside of AMD based ones. Even Intel based systems may be vulnerable but for some reason the "researchers" specifically targeted AMD systems and never even bothered to figure out if other systems are vulnerable during testing.

Pointing out how shady the websit was and most likely sponsored by intel
You heard what you wanted to Brian

nothing confirmed, at all, even for the spectre vulnerabilities.
Stealing the private key from asmedia's s/w and then signing your own driver/bios/app(ahahah) doesn't mean that the cpu that trusts you has a vulnerability problem.
AMD stated, not explicitly though, that special conditions have to be met and those special conditions are not met by the zen cpu, but from other sources.
Just like Spectre, there's a potential attack. They went with the least damaging statement "ok, we will look at it. AMD is committed yada yada yada" instead of "AMD is going to hunt down those lying goddamn jews who dared to spread this shit blaming us"

>Oh the irony. Nevertheless the architecture itself seems to be secure.
If the psp had vulnerabilities, you'd be playing xboxone and ps4 games on your windows/bsd machine... which doesn't happen so far... even though some people managed to run debian on ps4.
The malware those jews claim to have, is something like systemd.
Systemd mounts bios parts as read/write memory, if you rm -rf /, you will brick you motherboard.... therefore rm -rf / is a malware.
hold the presses...

even if a key is leaked out in the wild, via any way, there's always the option to invalidate it and with a new microcode you could eliminate that thread.
PSP doesn't have hardcoded keys.
If the PSP had a vulnerability, that could mean that every arm cpu on the planet has the same problem.
Somehow there's no mention of anyone else, asmedia/arm, but AMD.
Jews being Jews.

motherfucking typos.
>you
your>thread
threat

“Vulnerabilities”

Attached: 8519E8F6-85D7-422E-89A1-97CBAFC94799.png (604x493, 128K)

>i wonder who could be behind CTS-labs

Attached: 1521134686517.jpg (1170x1974, 287K)

anandtech confirmed it when they asked CTS if they were funded by Intel and they said "oy vey" and jumped off the call

So called AMD vulnerabilities can be fixed with bios update because those aren't AMD processor vulnerabilities but third party components vulnerabilities like ASMedia chipsets

Attached: 1521219987575.jpg (940x672, 201K)

>Nobody said they were fake
retards were saying that.

>specifically targeted AMD systems and never even bothered to figure out if other systems are vulnerable during testing.
>Somehow there's no mention of anyone else, asmedia/arm, but AMD.
from what I've read, apparently some vulnerabilities in these external chips were well known already, so it could be that they stole the research and will never, ever post any technical details because of that

>AMD fixed their CPUs without slowing them down.
Because it was pretty much a non issue. You needed direct access to the computer for that vulnerability. CTS labs were either working for some shady investment firm that likes to manipulate the stock market or intel. The fact that they only gave a 24 hour window while the industry standard is around 30 days is really telling.

Goes both ways, funny.

Imagine how ridiculous this whole fiasco would be if it were in another market. Remove the mystique of tech which confounds the layman and its painfully absurd:
If you let someone into your house, and tell them they can do anything they want, then they can do anything they want
BREAKING NEWS: EVERY HOUSE IN AMERICA HAS SECURITY VULNERABILITY, HOUSING PRICES PLUMMET. CANADIAN MARKET SEEMINGLY UNAFFECTED.

>other market
Car thief can carjack if he has a key

it is a security vulnerability, it's just that no one cares, people trust other people, and petty thieves are the least intelligent ones out there, so they can't even use tools properly

wait so now you cant do funky stuff with a custom bios flashed/admin access anymore?

Wait, are you telling me that the "vulnerabilities" required admin access? Fucking really?

Yes.

>AMD fixed their CPUs without slowing them down.
ryzen is literally ivy bridge tier though

Not like Intel has done a whole hell of a lot since. Plus after the exploit fixes, Intel cpus are back to Ivy Bridge tier themselves. I'll take the CPU with more cores for the same price without jewish tricks thanks.

Sir, I must tell you that for the best interest of the CPU market costumers, you must delet this thread right now.

*We may have an economic interest*

Attached: Screenshot-2018-3-13 amdflaws_whitepaper pdf.png (790x107, 15K)

FUCK AMD AND THEIR ANTI-SEMITISM ANTI FEMINISM EVIL TECHNOLOGY

Attached: 1515145992968.jpg (691x771, 64K)

NO SHUT UP STUPID GOY

So basically AMD now also has to fix other companies' vulnerabilities lul

ivy bridge is close to core2duo IPC wise tho

Not just that. Half of them required doing things like REFLASHING THE FIRMWARE and INSTALLING VENDOR-SIGNED DRIVERS
The first requiring physical access to the hardware, and the second requiring not only admin access but admin access and a vendor who's willing to sign malicious code for you.

The security vulnerabilities were more or less meaningless. Read up on the background, the short of it is that a stock broking firm in israel hired some ex-'Israel's version of the NSA' guys to scrape up some exploits, and a PR firm to make them look like the worst thing ever.
Then they released it to short AMD stock. Probably legal in israel.

They were real vulnerabilities though- they would allow attackers to install rootkits into the CPU itself. After already compromising the system.

No, they gave AMD 0 hours to respond. AMD heard about these vulns FROM THE PRESS. The reasoning in the whitepaper was that 'AMD can't fix these anyway, so here you go. By the way our solution is to NEVER BUY AMD. EVER.'
It was a transparent attempt to manipulate the stock market.

This exploit is more or less: "If an attacker gets your car key, he can install a backdoor to open the car without the key in future".

Which is more or less accurate, but it's still like; So the attacker already has your fucking car key?

unlike your kiketel, amd won't go aheadand say "our shit is 100% secure". Because there is no such thing as 100% secure in the tech world. Shintelfags like you grab for straws and hype shit up. This is still literally a nothingburger.
>b-but, muh haxx with full admin access
>nothing wrong with my kernel goy
kys

Kys you antisemitic nazi. AMD stocks are worth $0.

it's more like the attacker has your car key and unrestricted access to your garage

This

Which means they weren't vulnerabilities. Even better is the fact that CTSlabs ins an Israeli firm with direct ties to Israel based Intel.

Literally fucking Jews engaging in jewry against AMD.

How much better would our PC hardware be in 2018 if we had let Hitler gas them all?

everyone have vulnerabilities, you just need to try hard enough to discover them.

wow projecting much?