1w6 uRPG 1w6 uRPG
  • Anmelden
  • Öffentlich

    • Öffentlich
    • Gruppen
    • Beliebt
    • Verzeichnis

Mit „meltdown“ getaggte Nachrichten

  1. grmpyoldman grmpyoldman

    #Spectre & #Meltdown: Exploiting modern microarchitectures https://fosdem.org/2018/schedule/event/closing_keynote/ #FOSDEM

    Sunday, 04-Feb-18 15:57:48 UTC von quitter.se
  2. clacke clacke lobsters

    Intel: [We just rushed out some microcode updates out the door to fix the #meltdown thing. Please don't use them.]

    https://archive.fo/8GYP0

    /via @lobsters https://lobste.rs/s/dy87wk/intel_warns_its_patches_for_chip_flaws_are

    Friday, 12-Jan-18 02:09:05 UTC von social.heldscal.la
  3. clacke clacke

    #meltdown #spectre which chips are affected?

    /via https://mipump.es/dana/image/yPhBTrL9Qqi23g7CMuO6EQ https://social.heldscal.la/attachment/1213411

    Thursday, 11-Jan-18 09:09:41 UTC von social.heldscal.la
  4. clacke clacke

    Quick update re: #debian mitigations for the CPU issues: #meltdown > Debian kernel team has worked to mitigate Meltdown in all suites. This mitigation is currently limited to kernels running in 64-bit mode (amd64 architecture) > wheez…

    Wednesday, 10-Jan-18 11:57:36 UTC von social.heldscal.la
  5. lnxw48a1 lnxw48a1 rpi , bobjonkman

    @bobjonkman Someone posted this explanation earlier: https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

    #meltdown #spectre !rpi

    Sunday, 07-Jan-18 22:54:51 UTC von nu.federati.net Wiederholt von clacke
  6. zatnosk zatnosk

    I find it kinda funny how computers are supposed to do exactly what you tell them to, but because SPEEEED, someone told the computers to guess ahead of time what might happen, instead of just doing what the instructions actually …

    Monday, 08-Jan-18 14:06:40 UTC von manowar.social Wiederholt von ghostdancer
  7. zatnosk zatnosk

    I find it kinda funny how computers are supposed to do exactly what you tell them to, but because SPEEEED, someone told the computers to guess ahead of time what might happen, instead of just doing what the instructions actually …

    Monday, 08-Jan-18 14:06:40 UTC von manowar.social
  8. lnxw48a1 lnxw48a1 rpi , bobjonkman

    @bobjonkman Someone posted this explanation earlier: https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

    #meltdown #spectre !rpi

    Sunday, 07-Jan-18 22:54:51 UTC von nu.federati.net
  9. stwn stwn

    A collection of #Meltdown/#Spectre postings https://lwn.net/Articles/742999/

    Saturday, 06-Jan-18 01:07:47 UTC von quitter.se
  10. stwn stwn

    A simple explanation of the diffs: #Meltdown vs #Spectre https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/

    Friday, 05-Jan-18 14:38:06 UTC von quitter.se
  11. vinzv vinzv gnusocialde

    !gnusocialde public service anouncement: In den nächsten Tagen wird es einen kurzen Ausfall geben, um den Server neu zu starten und den #meltdown Patch einzuspielen. Das macht der Provider, weshalb ich keine Kontrolle darüber…

    Thursday, 04-Jan-18 22:37:51 UTC von gnusocial.de in 48°22'0"N 10°53'55"O Wiederholt von grmpyoldman
  12. vinzv vinzv gnusocialde

    !gnusocialde public service anouncement: In den nächsten Tagen wird es einen kurzen Ausfall geben, um den Server neu zu starten und den #meltdown Patch einzuspielen. Das macht der Provider, weshalb ich keine Kontrolle darüber…

    Thursday, 04-Jan-18 22:37:51 UTC von gnusocial.de in 48°22'0"N 10°53'55"O
  13. espectalll espectalll

    Here's a nice website explaining the current mess with CPUs, the #Meltdown and #Spectre vulnerabilities https://meltdownattack.com/

    Thursday, 04-Jan-18 15:34:06 UTC von quitter.se Wiederholt von kuro
  14. espectalll espectalll

    Here's a nice website explaining the current mess with CPUs, the #Meltdown and #Spectre vulnerabilities https://meltdownattack.com/

    Thursday, 04-Jan-18 15:34:06 UTC von quitter.se
  15. grmpyoldman grmpyoldman

    Dafuq? RT @zigg: CERT recommends throwing away your computer and buying a new one. #meltdown #spectre https://www.kb.cert.org/vuls/id/584653

    Thursday, 04-Jan-18 14:05:05 UTC von quitter.se
  16. clacke clacke

    #meltdown #spectre https://www.kb.cert.org/vuls/id/584653 > The underlying vulnerability is primarily caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware. Me: So I gue…

    Thursday, 04-Jan-18 10:46:37 UTC von social.heldscal.la
  17. clacke clacke

    #meltdown Other methods are being discussed: >> I'm much less worried about these "nospec_load/if" macros, than I am >> about having a sane way to determine when they should be needed. >> >> Is there such a sane model right now, or are…

    Thursday, 04-Jan-18 10:12:45 UTC von social.heldscal.la
  18. clacke clacke

    #meltdown > The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault. That's…

    Thursday, 04-Jan-18 10:06:42 UTC von social.heldscal.la
  19. clacke clacke

    #meltdown #spectre #lkml

    https://lkml.org/lkml/2018/1/3/780

    Thursday, 04-Jan-18 10:04:10 UTC von social.heldscal.la im Zusammenhang Wiederholt von grmpyoldman
  20. clacke clacke

    #meltdown #spectre #lkml

    https://lkml.org/lkml/2018/1/3/780

    Thursday, 04-Jan-18 10:04:10 UTC von social.heldscal.la im Zusammenhang
  • Vorher

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Hilfe
  • Über
  • FAQ
  • AGB
  • Privatsphäre
  • Quellcode
  • Version
  • Kontakt

1w6 uRPG ist ein Mikrobloggingdienst von Arne (Drak) Babenhauserheide. Es wird mit der Mikrobloggingsoftware StatusNet (Version 1.1.1-release) betrieben, die unter der GNU Affero General Public License erhältlich ist. The running version includes the patches from draketo.de/proj/statusnet-patches.

Creative Commons Attribution 3.0 Alle Inhalte und Daten von 1w6 uRPG sind unter der Creative Commons Attribution 3.0 Lizenz verfügbar.