Abuse Melding

Je hebt een klacht over de onderstaande posting:

22-08-2022, 10:24 door Erik van Straten

Ik heb de publicatie (nog) niet gelezen, maar in https://www.theregister.com/2022/08/09/intel_sunny_cove/ schrijft Thomas Claburn onder meer: [...] determine an RSA-4096 key in about 38 minutes [...] OK stop maar met ontwikkelen van quantum computers, niet meer nodig ;-) Ook sommige AMD CPU's zijn kwetsbaar, het artikel eindigt met: "An attacker running on the same host and CPU core as you, could spy on which types of instructions you are executing due to the split-scheduler design on AMD CPUs," explained Gruss. "Apple's M1 (probably also M2) follows the same design but is not affected yet as they haven't introduced SMT in their CPUs yet." A spokesperson for AMD said the vulnerability has been designated medium severity and is being referred to as "AMD-SB-1039: Execution Unit Scheduler Contention Side-Channel vulnerability on AMD Processors." AMD's 1st, 2nd, 3rd Gen Zen processors are affected. "AMD recommends software developers employ existing best practices [1][2], including constant-time algorithms ...

Beschrijf je klacht (Optioneel):

captcha