Yes, per FLOP paper the mitigation overhead is 0.6%~>4.6% depending on context.Serious question:
Will the patch introduce a reduction in processor power?
My guess is yes, and probably measurable.
Yes, per FLOP paper the mitigation overhead is 0.6%~>4.6% depending on context.Serious question:
Will the patch introduce a reduction in processor power?
My guess is yes, and probably measurable.
They’re working on a new version of it called AppleSeek. At the moment, they’re “seeking” Chinese engineers who know what they’re doing.Have they patched the other FLOP?
Think it’s called Apple Intelligence.
Yes, and I guess the way to accomplish that now lies in the same country where their hardware is manufactured. They’re starting to realize like Google, MS, OpenAI, etc. that they may be overpaying some of their employees.They're too busy fixing Apple Intelligence.
Shrug, like the "correction" did for the Intel problems?Why would it reduce processing power?
If you read through the research details, it says when the value guessed is wrong, this problem of arbitrary CPu execution happens. If it guesses right, it improves performance e, and no problem. Intel problems or what ever has nothing to do with what researchers have published.Shrug, like the "correction" did for the Intel problems?
I would think it is going to cut available resources somewhere.
Why would it reduce processing power?
No, their security team is just prioritizing real dangerous zero day exploits and not “Look at how I can exploit a computer when I set it up juuuuuuust right.”Apple wants to spend their time building more gimmicky AI features to sell more devices than spending time fixing security holes.
If you have a habit of clicking on suspicious links that lead you to suspicious sites, and THEN leaving that suspicious site up and running… then you must be a security researcher, so you’re fine!What, we can't even get up to take a snack or a bathroom break?
If something is found in the wild, that’s an entirely different level of severity. When Security Researchers, via a controlled experiment, and, against a computer that is set up specifically as it needs to be in order to be exploited, exploits that computer over a span of 10 minutes or so, that’s not unexpected. If a Security Researchers could NOT exploit a computer they have physical access to, I’d be surprised.It was not a "correction" but instead a "mitigation" at the intel problem and it is a similar problem here:
The speculative prediction gains a lot of efficiency and speed. If you can't use (or less use) that prediction gains to mitigate the problem, you'll get a speed penalty - simple as that.
We'll see, how and when Apple finally closes these meanwhile widely known vulnerabilities... ¯\_(シ)_/¯
True, but what is scaring me that a "not-easy" vulnerabilities could be used in a chain to drop an attack.Depends how practical they are to exploit. A theoretical vulnerability isn't always practical to use in reality.
It’s HIGHLY unlikely that this could be used in a chain. As any chain that requires at least 5 minutes to work is a broken chain.True, but what is scaring me that a "not-easy" vulnerabilities could be used in a chain to drop an attack.
Correct... But now I try to avoid to diminish any vulnerability!It’s HIGHLY unlikely that this could be used in a chain. As any chain that requires at least 5 minutes to work is a broken chain.![]()
The problem is that one winds up slowing the inevitable. If a conditional optimization actually does make things faster in a way that can be measured, even if it is by averaging multiple attempts, those measurements can still be used to determine if the optimization took place.CPUs normally run as fast as they can, for obvious performance reasons. But their inner workings can be exposed by analysing the timings of certain instructions.
Not an expert, but introducing randomised "jitters" to instructions would thwart any attempt to make sense of those timings. This necessarily means throwing away a small amount of computing power.
You know when Paul Atreides shuffles across the desert to fool the worms? It conceals his identity, but it's always going to be slower than a brisk walk.
apple intelligence is not a security tolerability of the same kind, it does not have a cve-number so it's a bit ot here but nice jokeHave they patched the other FLOP?
Think it’s called Apple Intelligence.
Some folks decided to become security researchers looking at all the attention they were getting as the world was going from non-networked computers to worldwide networked computers. Currently, it turns out that when “always connected” is the expectation, there are effective methods to defeat those attacks of yore.Hector Martin (reverse engineers Apple Silicon for Asahi Linux) is saying that the exploits these researchers discovered already have the appropriate mitigations in hardware, are even part of the spec in fact, and it’s effectively a software bug in the browsers not to use them rather than a hardware fault. In other words, nothing to see here. The researchers just did a poor job looking for the needed bits to flip. Software already has the ability to turn them off as needed and browser should already be doing so by default as it is their job to run untrusted code. This won't be a problem with most other software as the untrusted code has to share execution with the trusted code which is pretty much a browser exclusive thing in modern security design.
Hector Martin (@marcan@treehouse.systems)
HA, so here's why I couldn't reproduce SLAP. m1n1 accidentally turns off the SSBS bit in PSTATE on EL0 calls. It defaults to 1 on CPU startup. [SSBS: Speculative Store Bypass...social.treehouse.systems
No thanks.Yet another reason Firefox should be allowed to bring its own engine to iOS/iPadOS for people outside the EU, too.
Yup, I'm slowly moving away from Safari and using Firefox more. There are a little issues here and there in Safari that Firefox never seems to have.No thanks.
Regarding web site development, Firefox on iOS is so nice and easy with no issues I ran into, that even Safari on iOS had. Meanwhile, Firefox on Android, with its own engine, is way more difficult to code for and get everything working correctly when you have a more complex setup. Opera on Android is even worse (bottom of the barrel?) with just bizarre stuff, yet it is supposed to be based on Blink but I don't see it or feel it. Maybe it uses a different engine for mobile or something. Chrome is basically the same as Safari, easy.
Oh and I am not talking about anything big and fancy, just HTML, CSS and Javascript.
The good part, for development at least, is Firefox has good Development tools with a full mobile Firefox setup for testing. Opera also has a full mobile setup. And it seems to show the same as the real thing for both of them.
So, no, I don't want that on iOS. Web sites for iPhone? Simple and I would love to keep it that way. It is always the #1 mobile device in all my web stats.