Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Apparently the CEO sold a lot of his stock on Nov 29th and kept the bare minimum amount.

https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx

These stock sales need to be approved months in advance just for this purpose. It's schedule SO THAT they don't have the SEC breathing down their neck. But, the question really is, how long ago was this approved and schedule, and how long ago did Intel know about the issue? As mentioned by another, since Apple has already patched, it was known prior to it's public release.
 
As mentioned by another, since Apple has already patched, it was known prior to it's public release.

Cache-based side channel attacks were known for some time. Earliest papers were around 2010 I think, maybe earlier? Nobody really made a big fuss out of this back then. This new attack is basically a variation of those methods. I don't think that the media has reported this accurately (and as always, its a bit overblown), but I guess its good that this problem finally gets wide coverage.

This entire thing is just a continuation of the common line of years of sloppiness and not-taking-things seriously, both on Intel's and OS developers side of things.
 
My only worry is performance, as I don’t store sensitive information in any machine connected to the Internet. I understand (although don’t support) the teams who had fought hard to get these minutes of glory in the media, but their pseudo-glory will vanish as soon as CPU vendors release new architectures.

As I said, my main worry is performance, so I’ll protect my machines not against these vulnerabilities, but against the patches. I’ll also look forward to buy new CPUs that address these flaws in hardware rather than in software.

The world is full of teams looking for glory these years. It seems the economy problems have hit everybody hard.
 
My only worry is performance, as I don’t store sensitive information in any machine connected to the Internet. I understand (although don’t support) the teams who had fought hard to get these minutes of glory in the media, but their pseudo-glory will vanish as soon as CPU vendors release new architectures.

As I said, my main worry is performance, so I’ll protect my machines not against these vulnerabilities, but against the patches. I’ll also look forward to buy new CPUs that address these flaws in hardware rather than in software.

The world is full of teams looking for glory these years. It seems the economy problems have hit everybody hard.

But without people like these making vulnerabilities public, would companies bother to change their architectures to fix unreported problems?
 
These stock sales need to be approved months in advance just for this purpose. It's schedule SO THAT they don't have the SEC breathing down their neck. But, the question really is, how long ago was this approved and schedule, and how long ago did Intel know about the issue? As mentioned by another, since Apple has already patched, it was known prior to it's public release.

I gather the CEO's sale of stock was pre-planned, but that the plan was made after Intel learned of the vulnerability. ;)
 
For all those claiming there will be a massive class action suit, what grounds do you believe it'll be filed on?

I predict any such attempt will be a huge failure.
 
If you want security nowadays you have to go back to pen and paper.
You don’t need going back to pen and paper if your sensitive data is not connected to the internet and if you don’t use devices/apps that monitor your private life. Unfortunately, people love their private data to be connected to the internet, so, for the vast majority of people your pen and paper advice applies.
 
I think a HUGE question now is how much are the Apple A7 and newer SoC's--which are still based quite a bit on ARM technology--are affected by the Spectre exploit. Will Apple need to roll out an iOS 11.2.2 update to address this?
 
I actually kind of doubt they knew about it. While AMD is not affected, it does look like ARM chips are affected. This flaw has potentially been around since Pentium Pro. If Intel knew about it, they'd have quietly fixed it rather than letting it go. I think this is just a really, really good find by the researchers.

No, they knew, more than likely. As to why they seem to have done nothing about it, never underestimate corporate greed and inability to see past the next quarters profits.
 
But without people like these making vulnerabilities public, would companies bother to change their architectures to fix unreported problems?
The problem is not in the chips. The problem is in using devices connected to the Internet that store and monitor your personal data. If people were using technology as they should, these “vulnerabilities” would be irrelevant. The minutes of glory of these teams owe a lot to the success of Facebook, Cloud stuff, etc...
 
It was a rule 10b5-1 sale which means it had been planned well in advance and the rule is there to prevent inside trading.

The timing is just very unfortunate.

Maybe, HOWEVER this issue stretches all the way back to several generations of Intel CPUs so Intel could have know about it for years. Then when they learnt of the flaw maybe being discovered because people(Google security team) were investigating then the CEO decided to plan the sale.
[doublepost=1515086432][/doublepost]
That might be a stretch, I think the person you replied to is right in that the sale isn't something they can decide a couple days or weeks ahead. Maybe they kept it concealed for a while, but it's also possible he's just cashing out seeing as the stock market did really well last year.

And it is possible that Intel knew about this for a long while because the issue is not new. It has stretched back more than a couple of years. It does not take as long to plan the sale of the shares. So the CEO might have know about this for a long time and just decided that now was the time to sell the shares while they could before the flaw was finally revealed.
I wish people would stop defending a bunch of fat cat bosses of big companies who earn more in one day than average people earn all year and seem to not give a **** about anyone but themselves.
Then when things go bad they never EVER admit what they knew and what they did wrong but pass the buck and dump all the consequences usually on the staff on the shop floor/factory floor etc
[doublepost=1515086513][/doublepost]
How the hell can a user process access the kernel memory given the fact that all the memory allocated for it is a virtualized range of phisical memory that it sees as all the memory it can address????
Even trying speculative addressing it cannot make reference to an out of its bounds address.

No idea because I am not a programmer but if it were impossible then this would be a non issue but it is not so thereof it is possible.
 
  • Like
Reactions: MrAverigeUser
These stock sales need to be approved months in advance just for this purpose. It's schedule SO THAT they don't have the SEC breathing down their neck. But, the question really is, how long ago was this approved and schedule, and how long ago did Intel know about the issue? As mentioned by another, since Apple has already patched, it was known prior to it's public release.
Google shared data with CPU manufacturers in summer AFAIU.
 
Do we know if any Macs have suffered a performance loss in High Sierra since the last patch that I believe deals with this CPU security issue?

I use my iMac as a DAW & while it's doing a great job for me on Sierra, I am concerned if I now upgrade to High Sierra & will suffer some loss in performance.
 
I have to agree to this. LOL

But in serious note,

No software or hardware is 100% Perfect. There will always be bugs. Nothing is also secure.

There are always vulnerabilities. People just need to find and catch those then fix it. (like a Legendary Pokemon that is hard to catch)

It can be 100% perfect, if people are clever enough and determined enough to make it happen. Look at modern fighter jets etc. Such as the Euro-fighter. The code for that thing is serious hardcore and needs to be. I mean it would be dam useless if it had flaws/bugs that enabled it to just drop out of the sky because the pilot pushed the wrong button. I have an uncle who worked as an avionics engineer for the RAF so trust me code and hardware can be pretty dam robust if needed to be and if the costs are paid, something corporation hates doing.
 
I think a HUGE question now is how much are the Apple A7 and newer SoC's--which are still based quite a bit on ARM technology--are affected by the Spectre exploit. Will Apple need to roll out an iOS 11.2.2 update to address this?

Apple probably won't say a word about their own processors unless the media picks up on the story.

Based on the battery throttling incident, we know Apple doesn't communicate unless absolutely necessary.
 
  • Like
Reactions: MrAverigeUser
So, I looked through the relevant papers, and I don't see how this is a bug.

To me, it is quite clearly a bug! The CPU will read a location it is not allowed to read. The Meltdown demonstration reads memory. But - this bug should allow a user process to read any memory mapped location, even hardware registers! A malicious process could thus watch a communication channel - and even interfere with it. It could grab serial input from a console before the OS gets to it. Some hardware locations "do things" when read. Like say, turning off a cooling fan.

Further, a non malicious but buggy program could affect the system when it crashes. It might do a random read of a location that affects something (like above.)

From what I understand, simply rendering the cache clear instruction inoperable (which can be done via a microcode update), these attacks won't work anymore. But maybe I am missing something big.

It is easy enough to "clear" the cache by reading a different range of memory. All that's required is that none of the sentinel locations are in the cache. The lack of cache clearing instructions would simply slow down the exploit.
[doublepost=1515088387][/doublepost]
How relieved I am that I still run an Intel Core 2 Duo

Don't be relieved - it is affected by this bug.
 
To me, it is quite clearly a bug! The CPU will read a location it is not allowed to read.

Not exactly. It can infer the contents of the memory location based on how long it takes to read information (thus detecting whether given bits are in the cache or are not, and knowing that if it is in the cache that means it corresponds to the hypothesized value). It's a side channel attack.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.