On 06/01/18 12:00, Gerald Henriksen wrote:
For anyone interested this is AMD's response:
https://www.amd.com/en/corporate/speculative-execution
Cool, so variant 1 is likely the one that SuSE has firmware for to
disable branch prediction on Epyc.
cheers,
Chris
--
Chris Samuel : http://www.
On Sat, Jan 6, 2018 at 8:43 AM, Gerald Henriksen wrote:
> On Fri, 5 Jan 2018 22:52:19 +, you wrote:
>
> >There has been a conversation going on on the AMBER mailing list for some
> time, related to this and specifically to the Volta card in some way, since
> AMBER performs best on the consume
On Fri, 5 Jan 2018 17:32:19 -0500, you wrote:
>According to several articles I read today:
>
>Meltdown (1 exploit)is Intel-specific
>Spectre (2 different exploits) affects just about every processor on
>the planet.
For anyone interested this is AMD's response:
https://www.amd.com/en/corporate/
On Fri, 5 Jan 2018 22:52:19 +, you wrote:
>There has been a conversation going on on the AMBER mailing list for some
>time, related to this and specifically to the Volta card in some way, since
>AMBER performs best on the consumer grade stuff and doesnt require the
>enterprise class featur
On Fri, 5 Jan 2018 17:32:19 -0500, you wrote:
>According to several articles I read today:
>
>Meltdown (1 exploit)is Intel-specific
>Spectre (2 different exploits) affects just about every processor on
>the planet.
This is correct, and the other key difference is that so far there is
only a sol
On Jan 3, 2018, at 10:57, Lawrence Stewart
mailto:stew...@serissa.com>> wrote:
Of course you cannot use our less expensive hardware for whatever you want!
Beacuse it includes proprietary software, we can ex-post-facto forbid you from
using the thing you paid for any way you want.
Looks like S
On 01/04/2018 04:02 PM, Douglas Eadline wrote:
I'm actually building a dual 1080ti box to run Amber for one
of my customers this month. Fortunately it won't go in
a data center but in the lab. So when the Nvidia police
investigate the students can quickly switch over to GTA.
I can see it now -
On 01/05/2018 02:14 PM, Christopher Samuel wrote:
On 06/01/18 03:46, Jonathan Aquilina wrote:
Chris on a number of articles I read they are saying AMD's are not
affected by this.
That's only 1 of the 3 attacks to my understanding. The Spectre paper
says:
# Hardware. We have empirically ve
On 06/01/18 03:46, Jonathan Aquilina wrote:
Chris on a number of articles I read they are saying AMD's are not
affected by this.
That's only 1 of the 3 attacks to my understanding. The Spectre paper says:
# Hardware. We have empirically verified the vulnerability of several
# Intel processors
Meltdown - AMD not affected - specific to Intel products
Spectre - all cpus
https://blogs.manageengine.com/desktop-mobile/2018/01/05/meltdown-and-spectre-battling-the-bugs-in-intel-amd-and-arm-processors.html
Message d'origine De : Jonathan Aquilina
Date : 05/01/2018 17:47 (GMT
Trying to fathom all of this I stumbled on:
https://github.com/fanout/pollymer
Pollymer's existence seems to be only to wander the internet looking for a
header to copy.
On Jan 5, 2018 8:27 AM, "Christopher Samuel" wrote:
On 05/01/18 10:48, Jörg Saßmannshausen wrote:
What I would like to know i
Chris on a number of articles I read they are saying AMD's are not
affected by this.
On 05/01/2018 17:27, Christopher Samuel wrote:
> On 05/01/18 10:48, Jörg Saßmannshausen wrote:
>
>> What I would like to know is: how about compensation? For me that is
>> the same as the VW scandal last year. We
On 05/01/18 10:48, Jörg Saßmannshausen wrote:
What I would like to know is: how about compensation? For me that is
the same as the VW scandal last year. We, the users, have been
deceived.
I think you would be hard pressed to prove that, especially as it seems
that pretty much every mainstream
On 03/01/18 23:56, Remy Dernat wrote:
So here is me question : if this is not confidential, what will you do ?
Any system where you do not have 100% trust in your users, their
passwords and the devices they use will (IMHO) need to be patched.
But as ever this will need to be a site-specific r
This seems very relevant
https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html?m=1
On 4 Jan 2018 11:49 pm, "Jörg Saßmannshausen"
wrote:
> Dear all,
>
> that was the question I was pondering about all day today and I tried to
> read
> and digest any information I
15 matches
Mail list logo