• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel CPUs Since Haswell Vulnerable to "Zombieload v2" Attacks, "Cascade Lake" Included

Joined
Feb 3, 2017
Messages
3,726 (1.32/day)
Processor Ryzen 7800X3D
Motherboard ROG STRIX B650E-F GAMING WIFI
Memory 2x16GB G.Skill Flare X5 DDR5-6000 CL36 (F5-6000J3636F16GX2-FX5)
Video Card(s) INNO3D GeForce RTX™ 4070 Ti SUPER TWIN X2
Storage 2TB Samsung 980 PRO, 4TB WD Black SN850X
Display(s) 42" LG C2 OLED, 27" ASUS PG279Q
Case Thermaltake Core P5
Power Supply Fractal Design Ion+ Platinum 760W
Mouse Corsair Dark Core RGB Pro SE
Keyboard Corsair K100 RGB
VR HMD HTC Vive Cosmos
That very flaw Intel fixes (hopefully complete) now again is that very security flaw Intel said they got fixed/repaired already 6 months ago. Except that they didn't back then – but lied (sic!) about in doing so instead, despite they knew better. So if anyone may wonder who may have been come up with it, it was some university some people may remember now …
https://zombieloadattack.com/ said:
We disclosed Variant 2 to Intel on April 23th, 2019, and communicated that the attacks work on Cascade Lake CPUs on May 10th, 2019. On May 12th, 2019, the variant has been put under embargo and, thus, has not been published with the previous version of our ZombieLoad attack on May 14th, 2019.
This is part of normal vulnerability disclosure process.
Yeah, like many say since a while and like we all should know by now, the very day Meltdown & Spectre went public, Intel reflexively engaged into another (st)age of their infamous mode ›Cover-up‹. It seems to be some age of fraud actually.

I mean, if you consider how long they have had been informed about the issues back in the middle of 2017 well in advance before anyone else and how little they did. They kept shut about everything – and most likely they would've liked to keep everything under the rug. It's just that the Linux kernel-developer went public on January '18 as they got so darn fed up on how Intel handled all this that those leaked those anyway – after over half a year Intel did exactly no·thing, not even informing OEMs.

Funny enough, the Linux kernel-developer even vastly helped Intel to such an extent getting rid of those flaws without ANYONE noticing, that only a handful of kernel-developers (and only the most trusted ones) brought in given kernel-patches silently with·out ANY info on what exactly they were doing on it just around Christmas in 2017 (so when everyone is with their family and no-one would hopefully get notice of it) – which is a stark and the utmost extreme novum never happening before in the rather transparent open-source community. That being said, it escalated as Intel demanded more and more from them effectively doing their work hiding dirty laundry until it blew out publicly as even those few involved got just sick to the back teeth on how Intel was handling it.
Everyone involved was informed of the issues back in June 2017. This includes at least Intel, AMD, ARM, IBM, Microsoft, Apple and some other hardware or software vendors. Responsible disclosure process is pretty standard and for this type of products and complex issues time frames of 3-6 months between reporting the vulnerability to vendor and making it public are fairly common.

Spectre and Meltdown were intended to be made public in early January 2018 - 8th, if I remember correctly - alongside mitigation patches from vendors. Since Linux kernel development is open, it got patches in late December (later than other OS vendors, probably for the exact reason of what actually happened). There was discussion, suspicions and people quickly deduced what these patches were about or close enough, prompting earlier-than-planned publication of Spectre and Meltdown.
That's just since they constantly backing up themselves by buying their own stocks en masse.
...
So they're actively using their own stock's sudden fall in prices after quarter-results going public to buy their own fallen stocks in large numbers. If that isn't already sketchy, I don't know what it is …
Depends on whether Intel really thinks what they are saying publicly? They always twist the meaning for publicity purposes but are otherwise fairly straightforward about what they are doing. Nothing has been said about stock buyback but Intel CFO did say they "expect to have heightened competition over the next 18 to 24 months" (read: they are screwed). If a company has cash at hand this sounds like a perfect time to do stock buybacks. Especially if they intend to achieve a comeback after that.
 
Joined
Jan 17, 2019
Messages
18 (0.01/day)
Location
Hungary
System Name DarkTower
Processor AMD Ryzen 7 5800X3D
Motherboard MSI B550 MAG Tomahawk
Cooling ALPENFÖHN Brocken 3
Memory G.SKILL 32GB Ripjaws V DDR4 3600MHz CL16 KIT F4-3600C16D-16GVKC / 20528714217
Video Card(s) Sapphire Pulse 7900XT 20GB
Storage SanDisk SSD Ultra 3D 250 GB for system and 2TB +3TB Toshiba HDDs (DT01ACA200 + DT01ACA300) for data
Display(s) 27" QHD ViewSonic VX2780J-2K
Case Be Quiet! Dark Base 900
Audio Device(s) Integrated Realtek® ALC1200 / ALC1220P Codec
Power Supply Corsair HX620W modular
Mouse Gigabyte Force M7 Thor
Keyboard Kolink KBK3203C
Software Windows 10 Pro
New week, new intel vulnerability. Intel, we are dirty! :D
 
Joined
Nov 27, 2010
Messages
924 (0.18/day)
System Name future xeon II
Processor DUAL SOCKET xeon e5 2686 v3 , 36c/72t, hacked all cores @3.5ghz, TDP limit hacked
Motherboard asrock rack ep2c612 ws
Cooling case fans,liquid corsair h100iv2 x2
Memory 96 gb ddr4 2133mhz gskill+corsair
Video Card(s) 2x 1080 sc acx3 SLI, @STOCK
Storage Hp ex950 2tb nvme+ adata xpg sx8200 pro 1tb nvme+ sata ssd's+ spinners
Display(s) philips 40" bdm4065uc 4k @60
Case silverstone temjin tj07-b
Audio Device(s) sb Z
Power Supply corsair hx1200i
Mouse corsair m95 16 buttons
Keyboard microsoft internet keyboard pro
Software windows 10 x64 1903 ,enterprise
Benchmark Scores fire strike ultra- 10k time spy- 15k cpu z- 400/15000
Welcom to tpu, @Neverdie , and nice nick, it represents a goal of mine...
 
Joined
Mar 7, 2010
Messages
985 (0.18/day)
Location
Michigan
System Name Daves
Processor AMD Ryzen 3900x
Motherboard AsRock X570 Taichi
Cooling Enermax LIQMAX III 360
Memory 32 GiG Team Group B Die 3600
Video Card(s) Powercolor 5700 xt Red Devil
Storage Crucial MX 500 SSD and Intel P660 NVME 2TB for games
Display(s) Acer 144htz 27in. 2560x1440
Case Phanteks P600S
Audio Device(s) N/A
Power Supply Corsair RM 750
Mouse EVGA
Keyboard Corsair Strafe
Software Windows 10 Pro
Typical of Intel CPU's.. I am sure they will learn from their mistakes:/
 
Joined
Mar 23, 2016
Messages
4,840 (1.54/day)
Processor Core i7-13700
Motherboard MSI Z790 Gaming Plus WiFi
Cooling Cooler Master RGB something
Memory Corsair DDR5-6000 small OC to 6200
Video Card(s) XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming
Storage 970 EVO NVMe M.2 500GB,,WD850N 2TB
Display(s) Samsung 28” 4K monitor
Case Phantek Eclipse P400S
Audio Device(s) EVGA NU Audio
Power Supply EVGA 850 BQ
Mouse Logitech G502 Hero
Keyboard Logitech G G413 Silver
Software Windows 11 Professional v23H2
Intel claims they will be addressing 67 out of 77 security vulnerabilities found internally by Intel, and are part of the Intel Platform Update (IPU) process.

Untitled.jpg

In the table, updates are ordered from highest overall severity rating to lowest to give you a sense of how to prioritize deployment.

 
Joined
Sep 26, 2012
Messages
871 (0.20/day)
Location
Australia
System Name ATHENA
Processor AMD 7950X
Motherboard ASUS Crosshair X670E Extreme
Cooling ASUS ROG Ryujin III 360, 13 x Lian Li P28
Memory 2x32GB Trident Z RGB 6000Mhz CL30
Video Card(s) ASUS 4090 STRIX
Storage 3 x Kingston Fury 4TB, 4 x Samsung 870 QVO
Display(s) Acer X38S, Wacom Cintiq Pro 15
Case Lian Li O11 Dynamic EVO
Audio Device(s) Topping DX9, Fluid FPX7 Fader Pro, Beyerdynamic T1 G2, Beyerdynamic MMX300
Power Supply Seasonic PRIME TX-1600
Mouse Xtrfy MZ1 - Zy' Rail, Logitech MX Vertical, Logitech MX Master 3
Keyboard Logitech G915 TKL
VR HMD Oculus Quest 2
Software Windows 11 + Universal Blue
IMO, you would be crazy to buy an Intel CPU until their new architecture comes out around 2022.
 
Joined
Mar 21, 2016
Messages
2,508 (0.80/day)
Add in all of the other various mitigations and patches and that number you quoted is much higher. I really have to wonder how much slower these chips are in actual real-world numbers with all of these mitigations in place.

It comes from the idea that with every single mitigation we have to implement its resulted in a loss of performance. Why is that? Is it perhaps because the chip wasn't doing something it should have been doing in the first place but was ignoring it for the sake of performance? We'll never know for sure. It's a conspiracy.
I was exaggerating heavily poking fun of Intel that by the time all of these "glued together" vulnerability fixes get done with and added up you'd end up with a CPU that's about 4% as capable as it was originally sold and marketed as to consumers.
 
Joined
Sep 3, 2017
Messages
239 (0.09/day)
Location
Russia
Processor FX 8320 @4.2 | i7 2600 @3.8 | Xeon W3670 @ 3.6
Motherboard Asus Sabertooth R2.0 | Asus P8Z77-V Deluxe | Gigabyte X58-UD7
Cooling Zalman Performa 10+ | Zalman Performa 11+ | Zalman Performa 10+
Memory Crucial Ballistix Sport XT 32GB @ 1866 | Corsair Vengeance 32GB @1866 | Samsung 24GB @ 1600
Video Card(s) XFX Radeon 390x | Zotac GTX 1070 AMP Extreme | Zotac GTX 980 AMP Extreme
Storage Intel SSD / SAS 15k Fujitsu | Intel SSD / Velociraptors / Hitachi 2TB | Intel SSD / Samsung 1TB
Display(s) Samsung 245T | HP ZR30w | IBM 20" 4x3
Case Chieftec | Corsair Graphite 600T | Thermaltake Xaser IV
Audio Device(s) SB Titanium HD | SB Titanium HD | SB X-fi Elite Pro
Power Supply Thermaltake 875W | Corsair 850W | Thermaltake 1500W
Mouse Logitech | Logitech | Logitech
Keyboard Mitsumi Classic | Microsoft |Microsoft
Software W7 x64 | W7 x64 |W7 x64 / XP x32
I'am more and more starting to think all of this discovers here to help Intel gain more sells on newer "even more secure" products and force customers to phase out old still capable hardware faster. They don't care much about Westmere and Sandy, but Haswell and it's derivatives are still strong.
 
Joined
Jul 10, 2017
Messages
2,671 (1.00/day)
When will intel learn?

They will TRULLY learn only when consumers and businesses start using ther brains instead of their wallets, i.e. not any time soon.

But your question runs deeper - when will people learn? With the root-of-trust laying solely in intel's hands (or any other manufactirer for that matter) there would be no such thing as true security. We need a paradigm shift.
 
Joined
Aug 20, 2007
Messages
21,402 (3.41/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Who comes up with these mainstream gaming nomenclature.

The researchers, usually. NetCat in particulat is most likely a reference to the unix cat command, used to dump file contents.
 
Joined
Jun 3, 2010
Messages
2,540 (0.48/day)
I'am more and more starting to think all of this discovers here to help Intel gain more sells on newer "even more secure" products and force customers to phase out old still capable hardware faster. They don't care much about Westmere and Sandy, but Haswell and it's derivatives are still strong.
Definitely, there is a cultural appropriation going on.
The researchers, usually. NetCat in particulat is most likely a reference to the unix cat command, used to dump file contents.
Fine. But, Zombieload? Anybody remember the time Intel marketed Plants vs Zombies and made fun of F1 simulators?
 
Joined
Aug 20, 2007
Messages
21,402 (3.41/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
What can they even do, it's becoming more and more evident that they simply had no security considerations whatsoever all these years when all of these things have been implemented.

Nearly no design from the era Skylake comes from does. They are all rooted in the same design era paradighms of being able to run "trusted code."

AMDs Ryzen has a lot of those designs too, but is largely understudied. Still, being newer, it's not surprising it's doing better and only has Spectrev2 so far

Everyone really needs to start at the drawing board, but understandably, no one wants to, especially if it will just perform worse.
Fine. But, Zombieload?

Also the researchers proposed name, as the MDS vulnerability whitepaper states.

I really don't think Intel is trying to make these sound non-nefarious with names like "ZombieLoad"
 
Joined
Jun 3, 2010
Messages
2,540 (0.48/day)
I really don't think Intel is trying to make these sound non-nefarious with names like "ZombieLoad"
They have a new department just for these kinds of things, you know. It is called Product Assurance and Security Group. What better way to sell an idea making it sound like a standalone product.
 
Joined
Aug 20, 2007
Messages
21,402 (3.41/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
They have a new department just for these kinds of things, you know. It is called Product Assurance and Security Group. What better way to sell an idea making it sound like a standalone product.

It sounds like marketing. Yeah, that happens. These names were still researcher chosen, that tends to be the case and yes, the researchers like attention thus they get sensational names.
 
Joined
Mar 23, 2016
Messages
4,840 (1.54/day)
Processor Core i7-13700
Motherboard MSI Z790 Gaming Plus WiFi
Cooling Cooler Master RGB something
Memory Corsair DDR5-6000 small OC to 6200
Video Card(s) XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming
Storage 970 EVO NVMe M.2 500GB,,WD850N 2TB
Display(s) Samsung 28” 4K monitor
Case Phantek Eclipse P400S
Audio Device(s) EVGA NU Audio
Power Supply EVGA 850 BQ
Mouse Logitech G502 Hero
Keyboard Logitech G G413 Silver
Software Windows 11 Professional v23H2
Joined
Aug 20, 2007
Messages
21,402 (3.41/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Your forgetting AMD has stated a couple of times when questioned if Ryzen was effected by they same Intel exploits that AMD didn't shortcut security for performance.

I don't buy into the idea any of these were "shortcuts"

Skylake at it's core is a very tuned Sandy Bridge style design. These types of cores were born in an era where everyone was doing things this way. It wasn't a "shortcut," it was a design assumption that you could trust your code.

It gave us such things as speculative execution, which AMD also utilizes but aparently has done some level of tweaking to harden.

There is a reason meltdown also affected old arm chips, you know. But at least arm got off it's butt and introduced arm64.
 
Joined
Jun 3, 2010
Messages
2,540 (0.48/day)
I don't buy into the idea any of these were "shortcuts"

Skylake at it's core is a very tuned Sandy Bridge core. These types of cores were born in an era where everyone was doing things this way.

There is a reason meltdown also affected old arm chips, you know. But at least arm got off it's butt and introduced arm64.
You have it mistaken though - this isn't about the cores, rather that the address generator is affected. In essence, a seperate core that has been discreetly positioned outside of successive hardware generations. They'll need a completely new memory bus to move ahead. AMD is the better memory expert. We'll see how easily Intel deals with a major interference anyway, so don't take my word for it.
 
Joined
Apr 12, 2013
Messages
7,475 (1.77/day)
These names were still researcher chosen, that tends to be the case and yes, the researchers like attention thus they get sensational names.
Or you know they were fans of Resident evil, TWD et al? I feel TV doesn't get the kind of recognition it deserves in the tech industry, not just this per se but lots of innovations in tech have been "telecast" on TV first.
 
Joined
May 9, 2012
Messages
8,508 (1.87/day)
Location
Ovronnaz, Wallis, Switzerland
System Name main/SFFHTPCARGH!(tm)/Xiaomi Mi TV Stick/Samsung Galaxy S23/Ally
Processor Ryzen 7 5800X3D/i7-3770/S905X/Snapdragon 8 Gen 2/Ryzen Z1 Extreme
Motherboard MSI MAG B550 Tomahawk/HP SFF Q77 Express/uh?/uh?/Asus
Cooling Enermax ETS-T50 Axe aRGB /basic HP HSF /errr.../oh! liqui..wait, no:sizable vapor chamber/a nice one
Memory 64gb Corsair Vengeance Pro 3600mhz DDR4/8gb DDR3 1600/2gb LPDDR3/8gb LPDDR5x 4200/16gb LPDDR5
Video Card(s) Hellhound Spectral White RX 7900 XTX 24gb/GT 730/Mali 450MP5/Adreno 740/RDNA3 768 core
Storage 250gb870EVO/500gb860EVO/2tbSandisk/NVMe2tb+1tb/4tbextreme V2/1TB Arion/500gb/8gb/256gb/2tb SN770M
Display(s) X58222 32" 2880x1620/32"FHDTV/273E3LHSB 27" 1920x1080/6.67"/AMOLED 2X panel FHD+120hz/FHD 120hz
Case Cougar Panzer Max/Elite 8300 SFF/None/back/back-front Gorilla Glass Victus 2+ UAG Monarch Carbon
Audio Device(s) Logi Z333/SB Audigy RX/HDMI/HDMI/Dolby Atmos/KZ x HBB PR2/Moondrop Chu II + TRN BT20S
Power Supply Chieftec Proton BDF-1000C /HP 240w/12v 1.5A/4Smart Voltplug PD 30W/Asus USB-C 65W
Mouse Speedlink Sovos Vertical-Asus ROG Spatha-Logi Ergo M575/Xiaomi XMRM-006/touch/touch
Keyboard Endorfy Thock 75% <3/none/touch/virtual
VR HMD Medion Erazer
Software Win10 64/Win8.1 64/Android TV 8.1/Android 13/Win11 64
Benchmark Scores bench...mark? i do leave mark on bench sometime, to remember which one is the most comfortable. :o
New vulnerability for Intel CPUs? So what? Intel is throwing $$$$$ all over the Internet to inform us that their 6 core i5 dropped under $200(there are a number of articles all over the internet from multiple sites with almost identical title, informing about that). We should focus on that people, not that intel's CPUs are like swiss cheese.
Cascade Lake, brought to you by the makers of Swiss(?) Cheese - soon to be seen in a Microcenter near you :laugh:
good job putting a (?) .... because that expression is idiotic (but well in place thanks to ignorance), since between 2 Gruyere cheese, since initially the expression is about Gruyere cheese, the one that has the most hole in it is usually the fake French one lacking A.O.P and also lacking in taste.
rarely any hole in a Swiss cheese.... we do not cheap out on the total mass!

other than that, about the news .... "ohhhhh looook... i didn't expect that at all!" (sarcasme ofc) is the effect
funny in the end that anything that gave Intel an edge is turning out to be a vulnerability ....

oh, well... that comfort me in thinking a R5 3600/3600X or R7 3700/3700X are more desirable than a 9900KS
 

jgraham11

New Member
Joined
Oct 16, 2019
Messages
11 (0.01/day)
The question that always comes to mind for me: Are AMD processors really any more secure, or are we just not aware of their vulnerabilities because they're under substantially less scrutiny, and much less testing is geared towards them?

Well, do you remember CTS Labs, a security firm from Israel that Intel "allegedly" paid hundreds of thousands if not millions to discover bugs in AMD systems. The only thing they came up with, (other than catchy names for the bugs, ei. RyzenFall) was a few really hard to implement, must have physical access to the computer type bugs, some of those chipset bugs also existed in Intel systems but Intel was not mentioned. Hardly compares to being hacked by visiting a website like with most Intel CPU bugs.

If there were any actual bugs, believe it that Intel would make us aware of it, it would be on the news, on the radio warning people about it. Doesn't it seem weird that all these Intel CPU bugs haven't made the main stream media: news, radio, TV, etc.... Intel has even come out and said to disable Hyper-Threading in all but their latest CPUs, shouldn't the general public know about this??
 
Joined
Aug 6, 2017
Messages
7,412 (2.80/day)
Location
Poland
System Name Purple rain
Processor 10.5 thousand 4.2G 1.1v
Motherboard Zee 490 Aorus Elite
Cooling Noctua D15S
Memory 16GB 4133 CL16-16-16-31 Viper Steel
Video Card(s) RTX 2070 Super Gaming X Trio
Storage SU900 128,8200Pro 1TB,850 Pro 512+256+256,860 Evo 500,XPG950 480, Skyhawk 2TB
Display(s) Acer XB241YU+Dell S2716DG
Case P600S Silent w. Alpenfohn wing boost 3 ARGBT+ fans
Audio Device(s) K612 Pro w. FiiO E10k DAC,W830BT wireless
Power Supply Superflower Leadex Gold 850W
Mouse G903 lightspeed+powerplay,G403 wireless + Steelseries DeX + Roccat rest
Keyboard HyperX Alloy SilverSpeed (w.HyperX wrist rest),Razer Deathstalker
Software Windows 10
Benchmark Scores A LOT
I measured 13% performance penalty in CPU bound gaming scenarios between Spectre/meltdown fixes on vs off.There's a big performance penalty on random write speed on my ssds too.Definitely have them disabled on broadwell cpus,dont know about others.
 
D

Deleted member 158293

Guest
Intel servers have been a hacker's dream for quite a while now...
 
Joined
Jul 5, 2013
Messages
27,376 (6.61/day)
Having read the whitepaper pdf, in section 4 the required parameters of an attack vector once again require physical access to the target machine and being logged into an admin account(Windows or Linux). Remote attacks can not work. Once again, for the vast majority of average users, this is much ado about nothing...
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
26,849 (3.83/day)
Location
Alabama
System Name RogueOne
Processor Xeon W9-3495x
Motherboard ASUS w790E Sage SE
Cooling SilverStone XE360-4677
Memory 128gb Gskill Zeta R5 DDR5 RDIMMs
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 2TB WD SN850X | 2x 8TB GAMMIX S70
Display(s) Odyssey OLED G9 (G95SC)
Case Thermaltake Core P3 Pro Snow
Audio Device(s) Moondrop S8's on schitt Modi+ & Valhalla 2
Power Supply Seasonic Prime TX-1600
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11 Pro Workstation
Benchmark Scores I dont have time for that.
Intel servers have been a hacker's dream for quite a while now...

Oh? you know that how? You are aware that the vast majority of servers are currently running on Intel right? Can you produce some white papers on the intrusions into hyper visors these have provided?

Its just you know, I know that alot of these cloud providers run on clusters and these nodes carry the weight of VMs with tasks being distributed to them. So while its super cool that a mere 48 bits of memory of god knows what can in a lab be gleaned from a VMs memory address space via the host. Iv yet to see anyone perform the experiment on other hypervisors or in the type of environment most of these large services run in.

I'll standby. Thank you.
 
Joined
Aug 20, 2007
Messages
21,402 (3.41/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Oh? you know that how? You are aware that the vast majority of servers are currently running on Intel right? Can you produce some white papers on the intrusions into hyper visors these have provided?

Its just you know, I know that alot of these cloud providers run on clusters and these nodes carry the weight of VMs with tasks being distributed to them. So while its super cool that a mere 48 bits of memory of god knows what can in a lab be gleaned from a VMs memory address space via the host. Iv yet to see anyone perform the experiment on other hypervisors or in the type of environment most of these large services run in.

I'll standby. Thank you.

Why am I attributed to this?

No, they haven't, btw.

Having read the whitepaper pdf, in section 4 the required parameters of an attack vector once again require physical access to the target machine and being logged into an admin account(Windows or Linux). Remote attacks can not work. Once again, for the vast majority of average users, this is much ado about nothing...

Physical access is not needed. Admin is. Remote or not is irrelevant.

This may be not much, but again, another tool for the malware toolbox.
 
Top