• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Intel bug incoming? Meltdown and Spectre exploits

Soldato
Joined
10 Jul 2010
Posts
6,359
Just patched Windows 10 with the latest patch and ran the Heaven 4 benchmark and my results at 1080p were almost exactly the same as my results prior to installing the patch.

I did upgrade my Samsung 840 Pro SSD to the latest firmware in between though but I doubt that made much of a difference.
Which firmware do you have installed now? I've had DXM06B0Q installed for several years now.
 
Associate
Joined
12 Mar 2017
Posts
1,115
Location
Ireland
I wonder if Krzanich will weather this storm, Intel's quarterly reports are really good, but then again they keep taking PR hits, 14/10nm difficulties, vulnerabilities keep piling up, plus these accusations of insider trading (which seem unfounded but who knows at this point...).
 
Soldato
Joined
19 Feb 2011
Posts
5,849

That was from yesterday and was already scoffed at by pretty much every tech site, not to mention AMD released their own statement... Intel are basically trying to take everyone else down with them...

Notice they omit the "Read" fuction from their statement when talking about what the exploit can do? its laughable at best, some of the biggest PR tripe ive ever read.

It must be full panic station mode at Intel right now.
 
Caporegime
Joined
18 Oct 2002
Posts
33,188
Intel are going to have to up their game - this isn't the only serious and long standing hardware vulnerability that has come to light lately with their hardware - there have been at least 2 AMT disclosures in the last 6 months - and people seem to have quickly forgotten about stuff like https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/

Not a fan of AMD's position though - they seem to just deny any problem before there has even been any testing and/or make a big deal about "close to zero" when it isn't zero and seems based on only preliminary testing - I'm not sure I trust them any more than Intel when it comes to security and they have less resources to get on top of patching issues like this if they do arise.


Why are you saying based on no or preliminary testing? Near zero means, we've tested exhaustively but we can't be 100% sure so if we say zero and someone finds one vector for attack 10 years from now we can get sued, so we say near zero, nothing more or less. AMD have known about this issue at least as long as since Google brought it up a year ago to these companies... you think they've done zero testing between now and then? Also google themselves who found the exploit said that they couldn't only make Zen vulnerable to a non malicious attack they wrote, the three malicious attacks were only vulnerable on older AMD architectures (in a non default state) and everything Intel.

Implying they haven't tested is crazy.

Also the linux patch is hilarious. The check in english basically says, if it's an AMD processor, assume it's secure, otherwise enable the patch.
 
Man of Honour
Joined
13 Oct 2006
Posts
91,687
Implying they haven't tested is crazy.

I was talking about testing in a contextual fashion not saying there hasn't been any testing at all. Some of the things where they are saying close to or near zero are binary situations where either they should be fully proof against the known vectors in the situation talked about or vulnerable - near zero is the same as vulnerable just not as easily exploited within those specific parameters.
 
Caporegime
Joined
18 Oct 2002
Posts
33,188
I was talking about testing in a contextual fashion not saying there hasn't been any testing at all. Some of the things where they are saying close to or near zero are binary situations where either they should be fully proof against the known vectors in the situation talked about or vulnerable - near zero is the same as vulnerable just not as easily exploited within those specific parameters.

Sorry but that is bull. Near zero doesn't mean they are vulnerable but it's not easily exploited. Everyone has tested Zen and no one has been able to expose it, but that doesn't mean 2 or 10 years from now someone won't find some insane method to do it and if AMD said zero risk they can be sued.

When your words can have consequences, like billion dollar lawsuits you tend to say near zero to cover your backside, not because you are vulnerable and it's just not easy to do. If AMD know they can be exploited and are saying this for just an exploit that is hard to attack they would also get sued for that. Near zero means at this time no one has found any way in which AMD is vulnerable to this variant of exploit, but legally saying zero risk is a landmine waiting to kill us in the future, nothing more or less.
 
Soldato
Joined
28 May 2007
Posts
18,581
Dramatic yes but shows just another cheap ass intel move. save a buck here and cheat consumers there. from toothpaste thermal paste to this and beyond.

That is a good point. Intel have been stuck with minimal gains for some time and struggled to scale.
 
Back
Top Bottom