this post was submitted on 09 Aug 2024
184 points (85.9% liked)

Technology

59534 readers
3209 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] notnotmike@programming.dev 165 points 3 months ago (7 children)

I mean, I'm not much of a tinfoil hat, but this article feels extremely conveniently timed for Intel, who is currently going through a massive ordeal with their chips. Especially considering that the vulnerability is so extremely difficult to exploit that there's borderline no story here for 99% of people but the headline will still drive clicks and drama.

[–] Drathro@dormi.zone 62 points 3 months ago (1 children)

Difficult to exploit, already in the process of being patched. Truly, the most breaking of news.

[–] httperror418@lemmy.world 3 points 3 months ago (2 children)

How does the patch actually get delivered? Via windows update or using something else?

[–] Passerby6497@lemmy.world 14 points 3 months ago (1 children)

Most likely. Windows update (or the Linux equivalent on your platform) will download updated microcode to load at boot time to basically be a software patch for hardware issues. At least, that's how it was explained when the original speculative execution flaw was discovered and Intel was releasing foxes and shit for it.

[–] amanda@aggregatet.org 2 points 3 months ago

and Intel was releasing foxes and shit

I realise this is an autocorrect error, but it’s still funny 🦊

[–] Drathro@dormi.zone 6 points 3 months ago

On windows the article mentioned being a microcode patch via Windows update. Linux would be similar- but via a kernel update most likely. I'd assume that a general BIOS update would also do the trick, but then you're relying on motherboard vendors and it's unlikely many would provide such an update to older hardware, even if it's still widely used.

[–] TheGrandNagus@lemmy.world 41 points 3 months ago* (last edited 3 months ago) (1 children)

Intel has literally done this, and stuff like it before.

They back "independent" researchers who twist themselves in knots to make AMD look bad.

Look up the multiple counts of bullshit from a "research group" called Principled Technologies.

Sidenote: the guy who ran it was Ryan Shrout, who used to work for PC Perspective, and would usually give favourable reviews to Intel. After leaving Principled Technologies, he became head of technical marketing at... drumroll... Intel!

Principled Technologies isn't the only scam "independent researcher" Intel has set up or paid handsomely either.

[–] deuleb_biezelbob@programming.dev 1 points 3 months ago

I thought switching to AMD should've kept me save from Intel ME (I used ME_cleaner if I had too) :(

[–] heavy@sh.itjust.works 10 points 3 months ago

I loathe what part of the security community has become with the stunt hacking and vuln naming. That being said, I doubt it's some conspiracy. I don't know all the details but it wouldn't be exceptional to identify a bug that has existed in processor firmware or legacy code for a long time.

People are looking at this stuff all the time, both professionally and for fun. You could make the case that it's inevitable that there will be exploits found that affect a huge population.

In the end, as long as the layman gets smarter about computer security, the better people will react to vuln drops.

[–] sudo42@lemmy.world 8 points 3 months ago

Not too unusual. There have been a lot of new vulnerabilities announced lately. A few months ago they announced one that exposed all (?) mainstream CPUs, even Apple’s new chips.
Some of the vulns are serious, but many require very specific circumstances to actually work.

[–] megaman@discuss.tchncs.de 6 points 3 months ago

The folks who found it are presenting at Defcon this weekend, according to the article.

I imagine some of the industry press (i.e. Wired) are just looking through the Defcon agenda to figure out what to write. I saw two or three other articles about hacks or exploits and things like that that also mentioned it was bring presented at Defcon.

[–] beefbot@lemmy.blahaj.zone 1 points 3 months ago

Every last news article you see, you must ask: who benefits from this article’s appearance?

It’s not just judges who can be bought.

[–] ruse8145@lemmy.sdf.org -5 points 3 months ago* (last edited 3 months ago) (1 children)

Was there a real user risk to any of the flaws since heart bleed? Or did people mostly want to hate on Intel? I'm no tinfoil hatter either I'm just asking questions.

🙄

[–] Passerby6497@lemmy.world 9 points 3 months ago (1 children)

13th and 14th generation Intel processors can be physically damaged and degrade over time on the latest issue from Intel.

[–] auzy@lemmy.world 1 points 3 months ago

Yep. Reminds me of when ubiquiti damaged the radios on the unifi pro through dodgy firmware.

We ended up replacing them all just in case because we didn't want customers affected

The Intel issue is far worse because they're not even patching it quickly, and it is slowly frying cpus