Intel processors are vulnerable to two attacks, ZombieLoad and CacheOut.
Intel Responds to ZombieLoad and CacheOut Attacks : Read more
Intel Responds to ZombieLoad and CacheOut Attacks : Read more
The scheduled forum maintenance has now been completed. If you spot any issues, please report them here in this thread. Thank you!
Every trimester you get a new Intel security problem...
I'm ever more appreciative of my Ryzen 2700X.
You're wrong, because I actually followed this topic even since the original SPECTRE and Meltdown vulnerabilities were disclosed. AMD chips have been TESTED AS NON VULNERABLE to most of these exploits. Those that worked have been fixed : proof-of-concept exploits do not work on AMD chips.Just because you hear about Intel's issues, does not mean that your Ryzen is any safer.
You should notice a few things:
First, AMD processors are just as vulnerable, in their own way. Some of the same issues that affect Intel also affect AMD. You should be concerned about this, because they will eventually find issues that seriously affect both Intel and AMD.
Second, you don't hear about issues with AMD because Intel has the majority of the market, and hackers will generally try to influence the majority of the market instead of hacking only a few, they are attacking the majority.
Third, Because of the popularity of Intel processors in the current market, any headline about Intel carries more weight than a headline about an AMD.
Just because you hear about Intel's issues, does not mean that your Ryzen is any safer.
You should notice a few things:
First, AMD processors are just as vulnerable, in their own way. Some of the same issues that affect Intel also affect AMD. You should be concerned about this, because they will eventually find issues that seriously affect both Intel and AMD.
Second, you don't hear about issues with AMD because Intel has the majority of the market, and hackers will generally try to influence the majority of the market instead of hacking only a few, they are attacking the majority.
Third, Because of the popularity of Intel processors in the current market, any headline about Intel carries more weight than a headline about an AMD.
You're wrong, because I actually followed this topic even since the original SPECTRE and Meltdown vulnerabilities were disclosed. AMD chips have been TESTED AS NON VULNERABLE to most of these exploits. Those that worked have been fixed : proof-of-concept exploits do not work on AMD chips.
AMD have explained that ever since Bulldozer, they have implemented much stricter memory protection in their chips because console makers were very strict about it - and both Microsoft's and Sony's consoles are using AMD chips and haven't been hacked. This can be further proven with the history of implementing the only workaround currently available to Spectre (the one vulnerability that affects all OOP processors in existence) in the Linux kernel : retpoline. For the latter, kernel developers ended up disabling most of the mitigation when running on AMD chips, because firmware updates plugged most of the holes and those they didn't had low-impact workarounds.
So, the fact that Intel is easier to crack because they have a bigger slice of the market thus more attempts have been made is bullsh*t - AMD's total amount of chips on the market can be counted in the dozens of millions, if their chips were vulnerable they'd have been exploited already, especially the juicy console market where a single exploit would mean that ALL current consoles could be hacked instantly, including user accounts and credentials, often attached to a credit card account and used by people who are absolutely not tech-savvy.
Finally, considering that AMD is reaching a fifth of the x86 CPU shipments overall and 50% on the DIY market, any hacker worth their salt would try to exploit anything they could on them - and they were close : a vulnerability in the early Ryzen chipsets was found, and worked around quite quickly, for that very reason.
The only ones who said AMD were affected just as bad were Intel PR, and they were all debunked under 48 hours.
Actually, YOU should note a few things:
First, AMD is not vulnerable to CacheOut. The researchers who discovered this latest speculative execution flaw make that pretty clear.
Second, hackers didn't discover this, or any of the other speculative execution/side channel attacks. Academic/computer researchers did. And they're not "attacking the majority" -- they've been analyzing chip architectures, including AMD, ARM and others for YEARS.
Third, and finally, while Intel is obviously the bigger and more well known company, that doesn't change the fact ALL of the previously discovered side channel attacks that were first revealed in January of 2018 (Meltdown, Spectre, Fallout, ZomebieLoad, and their respective variants) affect Intel chips, whereas only Spectre affects some AMD chips. So you can argue about headlines and media coverage, but the fact is the company has designed their chips -- and their subsequent patches -- in a way that makes them vulnerable to data leak attacks like CacheOut.
You might want to learn how the "Academics/computer researchers" are researching a vulnerability. It might surprise you on why they find issues with chip architectures, then you will understand a bit better. How long did it take them to find Spectre, Meltdown and the others?
Bro, I'm a tech journalist and I cover cybersecurity for a living. I've written and edited a number of stories about these side channel attacks, and I've interviewed members of the some of the research teams of these flaws. I know the history of Meltdown and Spectre, from the six-month-plus disclosure process to the research into ASLR bypasses that preceded the speculative execution findings. And more importantly, I know how quickly post-Meltdown & Spectre other researchers beyond Google's Project Zero and Graz University found additional side channel and speculative execution attacks for Intel chips.
Try again.
Just because you hear about Intel's issues, does not mean that your Ryzen is any safer.
You should notice a few things:
First, AMD processors are just as vulnerable, in their own way. Some of the same issues that affect Intel also affect AMD. You should be concerned about this, because they will eventually find issues that seriously affect both Intel and AMD.
Second, you don't hear about issues with AMD because Intel has the majority of the market, and hackers will generally try to influence the majority of the market instead of hacking only a few, they are attacking the majority.
Third, Because of the popularity of Intel processors in the current market, any headline about Intel carries more weight than a headline about an AMD.
Please stop spreading disinformation on the basis of bad assumptions. When you have some evidence to back up your claims, then you can make them.Just because you hear about Intel's issues, does not mean that your Ryzen is any safer.
Five years ago, almost nobody was looking. Today, the best thing a computer security researcher can do for their career prospects is to find one of these vulnerabilities. There's now vastly more scrutiny - not only by universities, but also Google, Microsoft, and others. And, as the sham "Ryzenfall" incident showed, also a lot of financial incentive to find them.Let me narrow it down to this. Just because they haven't found a vulnerability doesn't mean that there are none. Five years ago, Meltdown and Spectre didn't exist. They do now. Five years from now, who knows what will be discovered.
It's preposterous to claim that because no computer is completely safe, that we shouldn't be concerned about the poor safety track record of one particular vendor. That logic might work for you, but most people aren't so easily duped.I will leave you with this thought. Any computer built by man can be hacked by man.
Citation needed for all for this.
Please post your proof.
Please stop spreading disinformation on the basis of bad assumptions. When you have some evidence to back up your claims, then you can make them.
Five years ago, almost nobody was looking. Today, the best thing a computer security researcher can do for their career prospects is to find one of these vulnerabilities. There's now vastly more scrutiny - not only by universities, but also Google, Microsoft, and others. And, as the sham "Ryzenfall" incident showed, also a lot of financial incentive to find them.
It's preposterous to claim that because no computer is completely safe, that we shouldn't be concerned about the poor safety track record of one particular vendor. That logic might work for you, but most people aren't so easily duped.
This is a forum. As long as it's on topic, users can answer other users as they see fit.None of these responses were targeted at you. Stop trying to hijack this thread.
The only one I see trying to hijack it is you! You should know by now that you can only control your own comments, not how they're received. You don't get to shut down the conversation, if you don't like where it goes.None of these responses were targeted at you. Stop trying to hijack this thread.
As it stands, five years ago, only AMD was looking because their clients asked them to. They may have been in the same boat as Intel's if they hadn't been paid to be paranoid.Five years ago, almost nobody was looking. Today, the best thing a computer security researcher can do for their career prospects is to find one of these vulnerabilities. There's now vastly more scrutiny - not only by universities, but also Google, Microsoft, and others. And, as the sham "Ryzenfall" incident showed, also a lot of financial incentive to find them.
It's preposterous to claim that because no computer is completely safe, that we shouldn't be concerned about the poor safety track record of one particular vendor. That logic might work for you, but most people aren't so easily duped.
You have totally missed the point of my post.
The point I was making is don't feel so secure about the processor you have.
Let me narrow it down to this. Just because they haven't found a vulnerability doesn't mean that there are none. Five years ago, Meltdown and Spectre didn't exist. They do now. Five years from now, who knows what will be discovered.
I will leave you with this thought. Any computer built by man can be hacked by man.
So why is intel having breakout earnings reports based on the 'datacenter' chips? Are these vulns not relevant? Do the people driving the purchasing decisions know something we don't?
Citation needed for all for this.
Please post your proof.
The post wasn't posted to you. Stop trying to hijack this thread.
Intel keeps releasing mitigations that they claim address the issues, and maybe they're doing some discounting and sweetheart bundle deals. Perhaps their customers are too lazy to switch up their infrastructure and just keep hoping that Intel has finally found and mitigated the last of the issues.So why is intel having breakout earnings reports based on the 'datacenter' chips? Are these vulns not relevant? Do the people driving the purchasing decisions know something we don't?
No, it's only because no one ever got fired for buying Intel, and Intel having production shortages they don't have to lower their prices on the high value data center shipments yet.So why is intel having breakout earnings reports based on the 'datacenter' chips? Are these vulns not relevant? Do the people driving the purchasing decisions know something we don't?
So why is intel having breakout earnings reports based on the 'datacenter' chips? Are these vulns not relevant? Do the people driving the purchasing decisions know something we don't?