No, because you can't trust what the hardware of an infected system tells you. Knowing malicious code is out there is not a case of confirming an active operating infection based on a hardware-level vulnerability. You are unlikely to ever get that (though you may with very advanced tools in a lab setting, but that doesn't really count). Thus, my point.
Yes.
Did you read what I said
and what you quoted? Apparently not.
I agreed with you that the less experienced (and careless/ignorant) would not know how their system got infected. But (and you just agreed with this!
) the well equipped professional would. So "yes".
And
of course what the professional sees in their well equipped labs counts! You can't dismiss facts you don't like just because they show how incorrect your BS is!
How do you think the anti-malware industry discovers new malware? They use, among other techniques, honeypots to capture new code for analysis so they can create definition files and other detection methods block such malware. So
of course the use of advanced tools in a lab setting counts.
True but, being a operating professional in this field, it's not coming from me.
Yes it is. You may be an OS professional but that does not qualify you as being a malware or hardware or CPU vulnerability professional.
You made a blanket statement saying malware that came via one of these Intel CPU vulnerabilities would
"be untraceable". Like all blanket statements, that is wrong, thus BS coming from you! You also claimed there will "
never" be a report of such an infection. Another blanket statement for more BS. Professional labs (which do indeed count!) and "white hats" have already reported there are several 100 pieces of malware out in the wild that are designed to exploit these vulnerabilities. But there is yet to be any report of any of those being successful at penetrating all a computer's defenses and succeeding at exploiting one of those vulnerabilities.
Will we see such a report? I can't foretell the future
and neither can you! That's the point! But I sure suspect if/when such malware infections are discovered, it will be reported simply because the IT press loves to report bad news, and there are many AMD fans who will parrot those reports - for years to come.
And yes, I am fully cognizant of the irony in stating "all blanket statements are wrong".
But the gas pumps are all still mag strip readers as far as I know.
At least in my part of the world.....
A new station in my area was just built and it has a chip reader. Where I normally get my gas, they just put in all new pumps but they use strip readers. However, you have to enter the zip code tied to the billing information for that card to proceed. I know two people who have had their wallets stolen. Both were recovered with their driver's licenses still in the wallets. Only the cash and credit cards were stolen. So unless the bad guy memorized the zip code from the license before tossing the wallets, they at least could not use one of those cards to buy gas at those pumps.