It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
This is definitely the nastier of the two exploits and affects all modern processors (Intel, AMD, ARM, etc.) and operating systems that we know of. Spectre in effect tricks "error-free" applications that follow "best practices" to provide access to arbitrary locations in their memory. Spectre, like Meltdown, breaks down the barriers between applications, but researchers indicate that "the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre."
originally posted by: DontTreadOnMe
a reply to: ArMaP
So, how much damage could this breach do to the average computer user?
originally posted by: ArMaP
originally posted by: SR1TX
This is more than likely a back door purposefully put there.
I don't think this was a back door, as, although it gives access to all of the memory, it's not an easy way of getting information about what people are doing in the computer, as they would had to know what was on the memory, and while a simple text file is easy to understand an image or a video is not, and it would give them a lot of work just to know what someone was doing.
originally posted by: StallionDuck
Instead, they should give me a new rig or the money for one that will fix the issue and give me the performance I have and what I paid for.
This is like buying a new car and the company saying, sorry... we have to fix your engine but it'll make your car 30% slower and 30% less torque or more... Isn't Apple getting sued for something kinda similar ?
originally posted by: ArMaP
a reply to: StallionDuck
I think the problem is a design problem, not an implementation problem, and that's why it affects more than just Intel processors.
PS: about my benchmarks, I reran the benchmark and got slightly different values (as expected), and the differences appear to be closer to the benchmark error margin.
The Spectre exploit is much more nefarious and impacts Intel, AMD, and ARM. This exploit can access kernel memory or data from other applications. Researchers contend that fixing this exploit would require a fundamental re-tooling of all processor architectures, so we'll live with the threat of this vulnerability for the foreseeable future. Fortunately, this exploit is extremely hard to execute and requires an elevated level of knowledge of the interior workings of the target processor.
Antivirus firms are gradually adding support for Microsoft's Windows patch for the Meltdown and Spectre attack methods that affect most modern CPUs.
As Microsoft warned this week, it's not delivering its January 3 Windows security updates to customers if they're running third-party antivirus, unless the AV is confirmed to be compatible with it.
The Meltdown virus is specific to Intel, while Spectre affects devices including laptops, desktop computers, smartphones and internet servers.
originally posted by: StallionDuck
The conspiracy theorist in me thinks that this was something the gubment was using as a back door to our systems for all these years anyways, if not Intel itself. Someone saw the flaw and they had to report it because of it. They knew about this for some time before they even came out with it.
How can you have 2 viruses or trojans that no one has ever used for a 'non flaw' that no one had ever known about?
- The exploits were created by Intel to test their flaws? ehhhh no. If they had, they wouldn't have mentioned it as though it was out there in the wild unless it was taken and distributed by someone in house.
An attacker would have to be able to put some code on to a user's computer in order to try to exploit either Meltdown or Spectre.
This could be done in a variety of ways, but one - running such code in a web browser - is already being closed off by companies such as Google and Mozilla.
Users can also, for example, use Chrome's "site isolation" feature to further protect themselves.
Some cyber-security experts have recommended blocking ads, browser scripts and page trackers as well.
Even if an attacker did get access, they would get only "snippets" of data from the processor that could eventually be pieced together to reveal passwords or encryption keys, says cyber-security expert Alan Woodward, at the University of Surrey.
That means the incentive to use Meltdown or Spectre will at first probably be limited to those prepared to plan and carry out more complex attacks, rather than everyday cyber-criminals.
When it is working, a computer shuffles around huge amounts of data as it responds to clicks, commands and key presses.
The core part of a computer's operating system, the kernel, handles this data co-ordination job.
The kernel moves data between different sorts of memory on the chip and elsewhere in the computer.
Computers are engaged in a constant battle to make sure the data you want is in the fastest memory possible at the time you need it.
When data is in the processor's own memory - the cache - it is managed by the processor but it is at this point that the newly revealed vulnerabilities come into effect.
Spectre essentially gets programs to perform unnecessary operations - this leaks data that should stay confidential.
Meltdown also grabs information - but it simply snoops on memory used by the kernel in a way that would not normally be possible.
Both attacks exploit something called "speculative execution", which prepares the results of a set of instructions to a chip before they may be needed.
Those results are placed in one of the fastest bits of memory on the computer's processor chip.
Unfortunately, it turns out that it is possible to manipulate this forward-looking system (for example by getting the processor to perform extra operations it wouldn't normally do).
Bit by bit, this technique can allow an attacker to retrieve bits of sensitive data from the computer's memory.