- Joined
- Jan 10, 2011
- Messages
- 1,446 (0.29/day)
- Location
- [Formerly] Khartoum, Sudan.
System Name | 192.168.1.1~192.168.1.100 |
---|---|
Processor | AMD Ryzen5 5600G. |
Motherboard | Gigabyte B550m DS3H. |
Cooling | AMD Wraith Stealth. |
Memory | 16GB Crucial DDR4. |
Video Card(s) | Gigabyte GTX 1080 OC (Underclocked, underpowered). |
Storage | Samsung 980 NVME 500GB && Assortment of SSDs. |
Display(s) | ViewSonic VA2406-MH 75Hz |
Case | Bitfenix Nova Midi |
Audio Device(s) | On-Board. |
Power Supply | SeaSonic CORE GM-650. |
Mouse | Logitech G300s |
Keyboard | Kingston HyperX Alloy FPS. |
VR HMD | A pair of OP spectacles. |
Software | Ubuntu 24.04 LTS. |
Benchmark Scores | Me no know English. What bench mean? Bench like one sit on? |
Like Reddit is also weed whacking this thing to oblivion, it looks like a pure smear campaign.
Red flags:
- 24h deadline before publishing
- All flaws require administrative rights in order to accomplish anything (one requires flashing firmware)
- All domains, linkedin records and so forth for a "16 year" in operations company date back at best...a year.
Subjectively speaking, compared to Meltdown attack page, this one has waaaay too many AMD logos. Without reading the text, one might actually mistake it for an ad! Count me up holding a pitchfork if Intel turned out to have a hand in this.
Objectively speaking, smear campaign or no, a vulnerability is a vulnerability. I'm personally quite illiterate on this matter so I'll defer judgement until "for dummies-"style security expert blog posts and articles start popping up.