1w6 uRPG 1w6 uRPG
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • Directory

Notices tagged with meltdown

  1. grmpyoldman grmpyoldman

    #Spectre & #Meltdown: Exploiting modern microarchitectures https://fosdem.org/2018/schedule/event/closing_keynote/ #FOSDEM

    Sunday, 04-Feb-18 15:57:48 UTC from quitter.se
  2. clacke clacke lobsters

    Intel: [We just rushed out some microcode updates out the door to fix the #meltdown thing. Please don't use them.]

    https://archive.fo/8GYP0

    /via @lobsters https://lobste.rs/s/dy87wk/intel_warns_its_patches_for_chip_flaws_are

    Friday, 12-Jan-18 02:09:05 UTC from social.heldscal.la
  3. clacke clacke

    #meltdown #spectre which chips are affected?

    /via https://mipump.es/dana/image/yPhBTrL9Qqi23g7CMuO6EQ https://social.heldscal.la/attachment/1213411

    Thursday, 11-Jan-18 09:09:41 UTC from social.heldscal.la
  4. clacke clacke

    Quick update re: #debian mitigations for the CPU issues: #meltdown > Debian kernel team has worked to mitigate Meltdown in all suites. This mitigation is currently limited to kernels running in 64-bit mode (amd64 architecture) > wheez…

    Wednesday, 10-Jan-18 11:57:36 UTC from social.heldscal.la
  5. lnxw48a1 lnxw48a1 rpi , bobjonkman

    @bobjonkman Someone posted this explanation earlier: https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

    #meltdown #spectre !rpi

    Sunday, 07-Jan-18 22:54:51 UTC from nu.federati.net Repeated by clacke
  6. zatnosk zatnosk

    I find it kinda funny how computers are supposed to do exactly what you tell them to, but because SPEEEED, someone told the computers to guess ahead of time what might happen, instead of just doing what the instructions actually …

    Monday, 08-Jan-18 14:06:40 UTC from manowar.social Repeated by ghostdancer
  7. zatnosk zatnosk

    I find it kinda funny how computers are supposed to do exactly what you tell them to, but because SPEEEED, someone told the computers to guess ahead of time what might happen, instead of just doing what the instructions actually …

    Monday, 08-Jan-18 14:06:40 UTC from manowar.social
  8. lnxw48a1 lnxw48a1 rpi , bobjonkman

    @bobjonkman Someone posted this explanation earlier: https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

    #meltdown #spectre !rpi

    Sunday, 07-Jan-18 22:54:51 UTC from nu.federati.net
  9. stwn stwn

    A collection of #Meltdown/#Spectre postings https://lwn.net/Articles/742999/

    Saturday, 06-Jan-18 01:07:47 UTC from quitter.se
  10. stwn stwn

    A simple explanation of the diffs: #Meltdown vs #Spectre https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/

    Friday, 05-Jan-18 14:38:06 UTC from quitter.se
  11. vinzv vinzv gnusocialde

    !gnusocialde public service anouncement: In den nächsten Tagen wird es einen kurzen Ausfall geben, um den Server neu zu starten und den #meltdown Patch einzuspielen. Das macht der Provider, weshalb ich keine Kontrolle darüber…

    Thursday, 04-Jan-18 22:37:51 UTC from gnusocial.de at 48°22'0"N 10°53'55"E Repeated by grmpyoldman
  12. vinzv vinzv gnusocialde

    !gnusocialde public service anouncement: In den nächsten Tagen wird es einen kurzen Ausfall geben, um den Server neu zu starten und den #meltdown Patch einzuspielen. Das macht der Provider, weshalb ich keine Kontrolle darüber…

    Thursday, 04-Jan-18 22:37:51 UTC from gnusocial.de at 48°22'0"N 10°53'55"E
  13. espectalll espectalll

    Here's a nice website explaining the current mess with CPUs, the #Meltdown and #Spectre vulnerabilities https://meltdownattack.com/

    Thursday, 04-Jan-18 15:34:06 UTC from quitter.se Repeated by kuro
  14. espectalll espectalll

    Here's a nice website explaining the current mess with CPUs, the #Meltdown and #Spectre vulnerabilities https://meltdownattack.com/

    Thursday, 04-Jan-18 15:34:06 UTC from quitter.se
  15. grmpyoldman grmpyoldman

    Dafuq? RT @zigg: CERT recommends throwing away your computer and buying a new one. #meltdown #spectre https://www.kb.cert.org/vuls/id/584653

    Thursday, 04-Jan-18 14:05:05 UTC from quitter.se
  16. clacke clacke

    #meltdown #spectre https://www.kb.cert.org/vuls/id/584653 > The underlying vulnerability is primarily caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware. Me: So I gue…

    Thursday, 04-Jan-18 10:46:37 UTC from social.heldscal.la
  17. clacke clacke

    #meltdown Other methods are being discussed: >> I'm much less worried about these "nospec_load/if" macros, than I am >> about having a sane way to determine when they should be needed. >> >> Is there such a sane model right now, or are…

    Thursday, 04-Jan-18 10:12:45 UTC from social.heldscal.la
  18. clacke clacke

    #meltdown > The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault. That's…

    Thursday, 04-Jan-18 10:06:42 UTC from social.heldscal.la
  19. clacke clacke

    #meltdown #spectre #lkml

    https://lkml.org/lkml/2018/1/3/780

    Thursday, 04-Jan-18 10:04:10 UTC from social.heldscal.la in context Repeated by grmpyoldman
  20. clacke clacke

    #meltdown #spectre #lkml

    https://lkml.org/lkml/2018/1/3/780

    Thursday, 04-Jan-18 10:04:10 UTC from social.heldscal.la in context
  • Before

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

1w6 uRPG is a microblogging service brought to you by Arne (Drak) Babenhauserheide. It runs the StatusNet microblogging software, version 1.1.1-release, available under the GNU Affero General Public License. The running version includes the patches from draketo.de/proj/statusnet-patches.

Creative Commons Attribution 3.0 All 1w6 uRPG content and data are available under the Creative Commons Attribution 3.0 license.