From the article:
helped in no small part by AMD reusing a publicly-accessible NIST example key as its security key
That's a whole new level of .. something.
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
From the article:
helped in no small part by AMD reusing a publicly-accessible NIST example key as its security key
That's a whole new level of .. something.
90% of security vulnerabilities are caused by "let's just use/do this for now and change it before production".
What does the fix look like?
Code scanners? Hackathons? Code review by new hires? Education? Methodology?
All of the above and more? There's always the risk of something falling through the cracks, so the more layers of security measures you add/can afford the better.
I'd like that to be "new", but... It's not exactly the first time this exact thing happened in tech.
I spent quite some time trying to find a better way to put it, but stupid, idiot, ignorance, incredulity just didn't seem to cover the experience of WTAF?
Any guesses how long it will take for someone to use this jailbreak to get Doom to run on just the CPU?
In theory, at least some of the affected processors should have more than enough cache to run it directly from there, right?
Though I have to admit that I don't understand CPU internals well enough to know if the microcode even has enough control over the chip to make that physically possible.
Perhaps this could be used to jailbreak the PS5 🤔