-
Hello,
I get an "illegal hardware instruction" when running this on Debian 8.
Linux *snip* 4.9.0-0.bpo.5-amd64 #1 SMP Debian 4.9.65-3+deb9u2~bpo8+1 (2017-01-05) x86_64 GNU/Linux
Strace ou…
-
# CPU Cache Side-Channel Attacks: Meltdown & Spectre | Guanzhou (Jose) Hu
One of the most dangerous kinds of security attacks is side-channel attacks since they are not part of the designed threat mo…
-
- [ ] Spectre and Meltdown for BOOM @poweihuang17
- [ ] Linux kernel @poweihuang17
-
https://github.com/speed47/spectre-meltdown-checker is pretty updated, you can check there (l1tf,foreshadow,etc)
thanks
-
We detected that {devices} is vulnerable to Meltdown/Spectre. You can learn more about these issues [here](https://meltdownattack.com). To fix the issue, please run apt-get update && apt-get upgrade.
…
-
Tried to run it:
```
root@5b51e04d92df:/Am-I-affected-by-Meltdown# ./meltdown-checker
Unable to find symbol sys_call_table in symbol map. Aborting...Aborted
```
Not sure what that means.
-
> Don’t serve user-specific or sensitive content from URLs that attackers can predict or easily learn. (...) Use anti-CSRF tokens or random URLs to break this kind of attack.
https://sites.google.…
-
https://mithril.js.org/examples.html
![capture258](https://user-images.githubusercontent.com/140737/38071727-d968ad30-32d7-11e8-9cef-36b0bb1b1f79.png)
-
Not sure where to hook this up to, but we need to have ibrs Specre/Meltdown protection enabled with a vendor provided or internal microcode_ctl package.
-
- **What sort of mod would you like to see? Please be as specific and detailed
as possible.**
Crowd Control is a Twitch extension that allows viewers to spend points for in-game effects. There c…