[ / / / / / / / / / / / / / ] [ dir / acme / ausneets / g / leftpol / pe / sw / vg / zoo ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 061b750b734e050⋯.png (169.35 KB, 770x612, 385:306, new-meltdown-spectre-attac….png) (h) (u)

[–]

 No.997547>>998555 [Watch Thread][Show All Posts]

https://www.zdnet.com/article/researchers-discover-seven-new-meltdown-and-spectre-attacks/

A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees.

Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack -- two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995.

 No.997557>>997564 >>997577

>Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre.

>In fact, the safety checks of said best practices actually increase the attack surface

Rustards btfo


 No.997564>>997573 >>999241

>>997557

this is why SeL4 is the real secure system. They actually know what they're talking about


 No.997573>>997578 >>997579

File (hide): dd30df8ea678589⋯.png (280.85 KB, 1920x1080, 16:9, micro.png) (h) (u)

>>997564

You're wasting your time to focus about OS when the foundations (hardware) are broken by design. Here's a nickel, kid. Get yourself a better computer. Then maybe you can talk about better OS.


 No.997577>>999029

>>997557

Oh, is rust still a thing? Rust shills have gotten awfully quiet lately. You still here Steve?


 No.997578

File (hide): ce839ac37fc2a08⋯.gif (23.51 KB, 411x480, 137:160, 1386485455302.gif) (h) (u)

>>997573

>just give up until you can afford better hardware, goyim

>kid


 No.997579>>997580

>>997573

>ARM

that's compromised too. Did you read the fucking article?


 No.997580>>997585

>>997579

No, it's not. The board I posted has an A20 SoC, which is a dual core ARM Cortex-A7. Those do in-order execution and no speculation, which means they're immune to all this Meltdown and Spectre bugs that plagues most other modern processors.


 No.997585>>997615

>>997580

ah I see

Speaking of ARM in relation to spectre/meltdown, I'm fairly certain that Cavium ThunderX is unaffected as well. ThunderX2 is though.

https://www.networkworld.com/article/3246707/data-center/meltdown-and-spectre-how-much-are-arm-and-amd-exposed.html


 No.997615>>997624 >>997652

>>997585

I'm not familiar with those, but not very surprised. Broadcom is pretty shit.

> There was quite a change between the first and second version of ThunderX because the ThunderX2 is heavily derived from IP acquired from Broadcom in 2016.


 No.997624>>997639

File (hide): 0c19a890f5e3795⋯.png (163.86 KB, 939x456, 313:152, themcorestho.png) (h) (u)

>>997615

>I'm not familiar with those

They're 48-core ARM chips designed for servers.

https://www.cavium.com/product-thunderx-arm-processors.html

you can get systems with them from these places

https://system76.com/servers/starling

https://www.pogolinux.com/products/servers


 No.997639

File (hide): fbb7b4f571483d5⋯.jpg (134.15 KB, 1080x550, 108:55, zero1.jpg) (h) (u)

>>997624

I noticed these ones earlier:

https://www.asacomputers.com/Cavium-ThunderX.html

But my old plan of wiring up 64 Banana Pi M2 Zero's will still come out cheaper. XD


 No.997652>>997801

>>997615

It has nothing to do with Broadcom. They simply license the cores just like everyone else. The Cortex A7 and A53 don't have speculative execution, but at the same time are very slow. I have a 32-bit Cortex A9 that still tears the shit out of the 64-bit A53 quads.


 No.997801

>>997652

> a vulnerable, buggy chip is faster

You're not telling me anything new.


 No.997802

File (hide): c41162769005a76⋯.jpg (34.66 KB, 490x361, 490:361, A1000.jpg) (h) (u)

I miss m68k.


 No.998536

>seven new spectre attacks

>after the last round of fixes hurt performance by 30% or so

>patching these will likely cost us another 50% performance bringing modern patched Intel systems down to late 1990s / early 2000s levels

>this doesn't even cover the new attacks against the intel gpu and its shared ram schemes

>complete apocalypse is just waiting to happen, a UEFI or ME virus could be active in dang near any computer that's been near the Internet or another computer or phone, silently ticking down 'till doomsday or waiting for a pre-arranged signal

So is Transmeta safe?


 No.998555

File (hide): 98b6b146e28062a⋯.png (610.9 KB, 555x466, 555:466, only_burning.PNG) (h) (u)

>>997547 (OP)

I used to be angry at these developments, but then I remembered that we live in hell on earth, and I can't stop laughing.


 No.998574>>998577 >>998987

File (hide): 0ad5535755b5cf5⋯.png (23.69 KB, 400x400, 1:1, 0wXB8Mmf_400x400.png) (h) (u)

RISC-V when?


 No.998577>>998722

>>998574

Switching ISAs won't fix timing attacks.


 No.998722>>998728

>>998577

It's not just a timing attack, it takes advantage of peculiarities of the Intel architecture. Remember, despite all the autistic screeching, this is largely an Intel problem.


 No.998728>>998995 >>999017 >>999207

>>998722

It only seems that way because Intel took more shortcuts, in order to have best performance. But all chips that do out-of-order execution and speculation are potentially vulnerable to this kind of attack. And in the paper they say there will probably be many, many such bugs discovered in the future.

Maybe they should just stop doing such dangerously overclever designs. Of course, that would force software developers to actually write non-shitty code, instead of assuming the hardware will pick up the slack.


 No.998798>>999216

THANK YOU LORD THEO, FOR HAVING THE FORESIGHT THAT TLBLEED WASN'T THE END AND MORE WOULD SOON FOLLOW!

LONG LIVE LORD THEO, OPENBSD BENEVOLENT DICTATOR FOR LIFE! FOR WHOM THE SUN RISES IN THE EAST, FROM WHOM THE SWEETEST DIGITAL HONEYS FLOW FORTH INTO THE WORLD!


 No.998987

>>998574 I really wanna use RISC-V.


 No.998995

>>998728

>Of course, that would force software developers to actually write non-shitty code

WE'RE DOOMED


 No.999017>>999084

>>998728

>Maybe they should just stop doing such dangerously overclever designs.

Those tricks are what gives you performance. The problem is keeping track of various states in flight.


 No.999029>>999220

File (hide): c76db1c59ab13eb⋯.jpg (384.3 KB, 1400x933, 1400:933, steve klabnik.jpg) (h) (u)

>>997577

I only visit /tech/ about once every week now. I stopped posting in this shithole.


 No.999084

>>999017

Those tricks are too dangerous. At least with software tricks, you can fix all the bugs. So it's slightly better to do the naughty things there.

But I don't need more performance anyway. Because I never asked for HD video, 3D games with a gazillion polygons, crazy Web 2.0 sites with 5 megs of obfuscated javascript, WebGL, in-browser video, and so forth. This is all marketing garbage, that I'd rather not have anything to do with ever.


 No.999207>>999222

>>998728

>all chips that do out-of-order execution and speculation are potentially vulnerable to this kind of attack

Unfortunately for Intel it appears that most of these architectures have no current working PoC, which leaves Intel as the sole chipmaker peddling CPUs which are currently vulnerable to Spectre type attacks. There have been many articles in the press by Intel shills trying to point out that all chips using out of order or speculative execution are "potentially vulnerable" to these attacks but it just seems desperate at this point.


 No.999216

>>998798

Heh, remember when Theo was giving a talk and the Intel shill under NDA screamed at him for bringing up Spectre and the fact that OpenBSD was disabling a bunch of stuff because they thought more vulns were coming down the pipe?


 No.999220>>999237

>>999029

Same. I moved to IRC and lainchan


 No.999222

>>999207

It's not just Intel shills or whatever, even though they probably try to paint things less biased against Intel (who are the worst offenders). Most of the more recent ARM processors were affected by Spectre bugs.

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

I haven't paid attention to AMD because I don't really care about x86 anymore. I already moved to ARM earlier this year.


 No.999225>>999228

Time to build my z80 computer


 No.999228>>999250

>>999225

Whomst makes this thing?


 No.999237

>>999220

Which IRC? Is it a .onion or .b32.i2p?


 No.999241

>>997564

This is a hardware issue. SeL4 is effected too.


 No.999250

>>999228

It looks to be the rc2014. The thing seems to be sort of altair 8800-like computer, only much smaller and a bit more diy.

http://archive.is/GEZfk

https://rc2014.co,uk/




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
35 replies | 9 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / acme / ausneets / g / leftpol / pe / sw / vg / zoo ][ watchlist ]