Install times notwithstanding, the scattered reports of problems actually installing this supplemental update has me hesitant. Is this really safe to d/l and try and install at the moment?
Yah, and other browsers are responsible for their own fixes.
With browsers fixed, Spectre can’t be exploited via a web page.
You are clueless. There is no way to exploit Spectre from a browser.
- WebKit relies on branch instructions to enforce what untrusted JavaScript and WebAssembly code can do. Spectre means that an attacker can control branches, so branches alone are no longer adequate for enforcing security properties.
I ran four different kinds of benchmark software, both before and after this update, and there was no loss of performance on my 2014 MBP SSD. In fact, it was slightly higher.
Using a browser is probably the easiest way to exploit Spectre.You are clueless. There is no way to exploit Spectre from a browser.
Are you installing it as an app on the computer or from an external USB drive?
Are you installing it as an app on the computer or from an external USB drive?
Weird , that test in ghacks says safari on 10.2is not vulnerable. Unsure why, I do have purify ad blocker. As an extra precaution I had disabled JavaScript, although I enabled it for the test.Using a browser is probably the easiest way to exploit Spectre.
https://www.ghacks.net/2018/01/11/find-out-if-your-browser-is-vulnerable-to-spectre-attacks/
https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
http://www.androidpolice.com/2018/0...ome-public-google-products-already-protected/
Weird , that test in ghacks says safari on 10.2is not vulnerable. Unsure why, I do have purify ad blocker. As an extra precaution I had disabled JavaScript, although I enabled it for the test.
Sorry I meant iOS 10.2I assume you mean 10.12. Safari isn't vulnerable on it because it was patched.
Sorry I meant iOS 10.2