News from Reddit: "AMD Listened to us, and added a PSP disable option in their new AGESA version!"
Not my picture (Credit to u/repo_code), but https://drive.google.com/file/d/1b4p3d-gtHbFvkUbHYC8HSIviL-1ssC7V/view My Gigabyte AB350 Gaming 3 also has a bios based on the new agesa version, through it doesn't have the PBS options by default, so I enabled them, flashed the new bios, and indeed the setting was there! >In order for me to trust AMD's implementation, they first need to can >that ridiculous Platform "Security" Processor. It is as useless and >dangerous as Intel Management Engine, running unknown code. > >A more plausible attack would be an application using malloc() for a >large segment of memory, and transmitting the "uninitialised" content, >which could contain private keys, sensitive documents, etc. from >applications that either don't zero the memory after finishing, or >programs which have crashed and the memory is now freely available >to other processes. > >It would be nice in those cases to have different >keys for different pages, so that when a process is terminated, the >kernel can (instruct the CPU to) overwrite the key with a new random >number. > >On Sat, 11 Mar 2017 20:18:37 +0000 (UTC) >Christian Weisgerber <[email protected]> wrote: > >> AMD thinks so. Last year they announced support for memory encryption >> in future CPUs. The top two Google hits: >> >> http://amd-dev.wpengine.netdna-cdn.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf >> >> https://events.linuxfoundation.org/sites/events/files/slides/AMD%20x86%20Memory%20Encryption%20Technology%20LSS%20Slides.pdf >>

