I suspect based on what I have already read (likely incomplete) that the vulnerability is a lot harder to exploit than what the hype would seem to indicate. I also suspect that good infosec practices will likely make this near to impossible to exploit as the descriptions provided so far, require the execution of code to exploit.
However, having said that, shame on chip manufactures for allowing this vulnerability to even exist.
Hmmmmmmmm...........
What if............?
Nah! Skip it!!!!!!!!!!!!!!!!!
Never Hotchee....Right! .......Right???
;)/;...........
So.....in order to ‘fix’ a hardware problem in the Intel processors it is necessary to write code for operating systems?
Bug or feature?
I don’t know about you but I seem to recall rumors that our intelligence and law enforcement community have long wanted backdoors into any data system.
Seems to me this “bug” is rather made to order for that purpose. The others bugs too. And they seem to date back to the correct time frame for the rumors: the Clinton Administration.
Unless you believe in coincidences that are way too convenient by half.
I wonder what they would have done with these had Hillary won? Why reveal them now?
I know, tin foil hat stuff. It’s not like they wouldn’t want Trump to have access to them but would Hillary.
How to protect your PC against the major Meltdown CPU security flaw
bkmk
The Meltdown issue can now be patched against by getting an update from your PC manufacture or Mother Board manufacturer.
Asus definitely has it covered. Asus lists it under Bios updates. Sometimes called MD update.
can you imagine buying a high performance vehicle, only to later be told that there was a design flaw that needs to be fixed but you’ll lose 30% performance?
Does this bug exist in virtual environments, like vmware?
So, if we unplug the PC and stick it in a closet and go back to snail mail, and the library for research and info, we would be okay, right?