Jeez.
Let's all switch to AMD.![]()
AMD is screwed as well. That's why I was asking where Cyrix is.
BL.
Jeez.
Let's all switch to AMD.![]()
They do when the heat gets turned up. I don’t recall them saying anything about this when 11.2 was released unless I missed it. Did I?That was quick. And yet there were still many crying "Why won't Apple be more open and talk about this!!!!"
Not nearly to the same degree it seems.AMD is screwed as well. That's why I was asking where Cyrix is.
BL.
For those who are still holding on to their iPhone 5, 5c, etc. If Apple is nice, they’ll do it.I wonder if Apple would update iOS 10.
They do when the heat gets turned up. I don’t recall them saying anything about this when 11.2 was released unless I missed it. Did I?
I need the wallpapers shown on the picture of this story. Any help from our valuable contributors will be appreciated
Yeah absolutely, I can understand that. I even agree with it. But when a problem like this does crop up on products that have been shipping for so long, it does make it that much harder to ensure the fix reaches everyone. The scale of the problem is that much worse. That's all I'm saying.
I did not know that about power rails.
Differential power attack is it’s name. I worked on some CPUs that were accidentally immune in the 90’s, and the attack was discovered a decade later![]()
And what about people with an iPhone 5 or 5c stuck on 10.2.x? That doesn’t include me, but at the moment my mom’s 5s is being kept (by me) on 10.3.3 due to performance issues. My mom’s 5s is nearly 4-years-old so she’ll probably get a new iPhone later this year depending on the SE replacement. However, some people are still using their 5 and 5c.That makes sense actually ... for major bugs like this companies tend to patch quietly, then when enough vendors have patched, then the bug is talked about openly. What is slightly more concerning is whether or not previous macOSes Sierra and El Cap will get security updates or if indeed the previous security updates already cover them (SecuritySteve says unlikely since the numbers don't match, but maybe). Apple really does need to confirm if the two older, still supported macOSes are secure or will be. It would be nice if the older iOSes (and even older macOSes) got updates too, but ... well ... that feels less likely![]()
If you stick to App Store apps and dont jailbreak, you should be fine.And what about people with an iPhone 5 or 5c stuck on 10.2.x? That doesn’t include me, but at the moment my mom’s 5s is being kept (by me) on 10.3.3 due to performance issues.
If that’s the case, good. I’m guessing it could potentially be a different story if you have a Mac if Apple’s mitigation attempts fall short.If you stick to App Store apps and dont jailbreak, you should be fine.
https://support.apple.com/en-ca/HT208331That makes sense actually ... for major bugs like this companies tend to patch quietly, then when enough vendors have patched, then the bug is talked about openly. What is slightly more concerning is whether or not previous macOSes Sierra and El Cap will get security updates or if indeed the previous security updates already cover them (SecuritySteve says unlikely since the numbers don't match, but maybe). Apple really does need to confirm if the two older, still supported macOSes are secure or will be. It would be nice if the older iOSes (and even older macOSes) got updates too, but ... well ... that feels less likely![]()
If that’s the case, good. I’m guessing it could potentially be a different story if you have a Mac if Apple’s mitigation attempts fall short.
https://support.apple.com/en-ca/HT208331
Apple has updated their documentation of the security content of macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan to include disclosure of the fix for Meltdown for all 3 OS.
Disable JavaScript? It’s always been enabled by default in Safari on every iPhone/iPad I purchased. A lot of websites don’t work properly without it, including major ones like Google. Whenever I accidentally left it disabled, like when I cleared some persistent cookies, many websites didn’t look right.Aye to expand on cmaier's answer: malicious code using Meltdown has to be running on your machine - unlike Spectre which can be run in a website's javascript. (Although Specter's damage is confined to the browser if run in the browser and javascript is disabled by default in iOS Safari so it shouldn't affect it unless you turn it on) Thus for meltdown, they have to get it past Apple's gate (not impossible, but very unlikely).
Though I have to agree that it would be better if Apple supported at least 1 older generation of iOS with security updates.
[doublepost=1515123327][/doublepost]
I saw that and that's what I thought as well ... the confusion is that the CVE numbers listed don't match meltdown CVE (CVE-2017-5753), but the descriptions of the Kernel patches certainly read like Meltdown! Hence the confusion.![]()
Disable JavaScript? It’s always been enabled by default in Safari on every iPhone/iPad I purchased. A lot of websites don’t work properly without it, including major ones.
Yeah, I have it on too. I thought it was disabled by default, but I guess I was wrong. But I believe javascript can launch spectre attack (actually one webpage claims Meltdown can be as well https://www.bleepingcomputer.com/ne...tion-vector-for-meltdown-and-spectre-attacks/, I read elsewhere it was just Spectre).
Disabling JavaScript will make websites like Google and Amazon look “broken”. Actually, I thought there was a more secure replacement for JavaScript, but JS is still dominant it seems.
Does it only affect Intel processors?
Spectre affects all modern processors, including those designed by Intel, AMD and ARM, but Meltdown is currently thought only to affect Intel chips manufactured since 1995, with the exception of the Itanium and Atom chips made before 2013.
https://www.theguardian.com/technol...uter-processor-intel-security-flaws-explainer
Could a firewall be used to protect against an attack on this CPU vulnerability?
Yeah, I also was wondering about the PowerPC chips being affected by these Meltdown and Spectre vulnerabilities.We are in a constant state of beta testing production "ready", publicly released hardware and software. Intel, AMD, Tesla, Samsung, Apple... it's all the same. Get it to retail as quickly as possible so we can make more money. Just part of the pillars of capitalism and our culture. Good times.
I could be wrong since PowerPC's are apparently susceptible as well, but I think this still goes back to the departure from RISC based architecture to CISC. Perhaps not directly related, but certainly a product of taking the easy road instead of sticking to more elegant design at the microprocessor level and requiring more skilled and thought out code at the software layer. Again, just my opinion but as always, I would love to hear others thoughts on this.