-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday, 2018-01-04 at 18:19 +0100, ArnoB wrote:
an interesting statement from Intel: https://newsroom.intel.com/news/intel-responds-to-security-research-findings...
"Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data." No? <https://hardzone.es/2018/01/03/demuestran-fallo-seguridad-intel/> (Spanish) How easy is to do an exploit proof. Some more links: <https://www.theregister.co.uk/2018/01/04/intel_meltdown_spectre_bugs_the_registers_annotations/> We translated Intel's crap attempt to spin its way out of CPU security bug PR nightmare As Linus Torvalds lets rip on Chipzilla (Skipping: Spanish link on what Linus Torvalds said, not nicely) <https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr> Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method <https://meltdownattack.com/> Meltdown and Spectre Bugs in modern computers leak passwords and sensitive data. <https://www.profesionalreview.com/2018/01/04/intel-lanza-una-herramienta-saber-equipo-vulnerable/> Intel launches a tool to find if a processor is affected. Spanish. - -- Cheers, Carlos E. R. (from openSUSE 42.2 x86_64 "Malachite" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlpOsA0ACgkQtTMYHG2NR9X0zACfdOEZ/PHvWlOh9CxgXVf1SAqD bQkAn22snnKtjWKx3IeyD1VUYul3KBYM =fIJd -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org