[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / asp / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / qst / sci / soc / sp / tg / toy / trv / tv / vp / wsg / wsr / x] [Settings] [Home]
Board
Settings Home
/g/ - Technology



Thread archived.
You cannot reply anymore.



File: gettyimages-186450097.jpg (193 KB, 738x492)
193 KB
193 KB JPG
https://twitter.com/tomwarren/status/948674110795800577
>>
>>64130581
classic Intel jew propaganda, based AMD wouldn't lie and say they weren't affected if they really were
>>
He said if you have skylake or later you shouldnt experience slow downs from the updates :)
>>
File: 1493471142759.jpg (8 KB, 179x200)
8 KB
8 KB JPG
>>64130609
this
>>
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
> These vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel, as well as the devices and operating systems running them.
>>
>>64130727
Amd users on win10 are getting the patch today if they like it or not :)
>>
>>64130797
It sounds like AMD has a different problem with security on spec branches so they should get the patch anyway, the original KAISER paper says it affected all x86 systems
>>
>>64130809
It pleases me the amd shills will suffer with us
>>
The patches for Android should appear on AOSP in the next day or two and we now have CVEs
https://source.android.com/security/bulletin/2018-01-01#2018-01-01-security-patch-level%E2%80%94vulnerability-details
>>
>>64130809
>>64130835
it's because AMD also makes ARM processors and ARM is affected, AMD's x64 processors aren't affected
>>
Well, can't you simply exclude the patch? Either you patch or not, your choice anyway.
>>
File: images (1).png (9 KB, 223x226)
9 KB
9 KB PNG
>>64130903
Google confirmed amd is effected
>>
>>64130581
>Senior Editor at The Verge
dude doesn't even know jack shit about consumer tech and he's suddenly an expert on kernel vulnerabilities? topkek.
>>
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

>These vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel, as well as the devices and operating systems running them.

AYYMD IS FINISHED & BANKRUPT

AYYMDPOORFAGS CONFIRMED ON SUICIDE WATCH
>>
>>64130846
good thing that android phones dont get updates so i will never get this
>>
File: goybrained.jpg (21 KB, 600x294)
21 KB
21 KB JPG
>>64130581
>he trusted a verge editor over a kernel engineer
>>
File: 1510702068392.jpg (63 KB, 630x630)
63 KB
63 KB JPG
>>64130952
Kek, what a Bozo
>>
File: 1514402834311.jpg (94 KB, 1044x812)
94 KB
94 KB JPG
>ryzen not listed as vulnerable
>>
Which systems are affected by Meltdown?

Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether ARM and AMD processors are also affected by Meltdown.
>>
> Trusts the verge jewrnalist over engineers

Topkek
>>
>>64130940
Disregard this autist. Thinks putting "lol big funny amd angry man meme" is making his argument less retarded.
>>
Windows and directX likely btfo.
>>
>>64131338
Google confirmed amd is effects by the bug. Truth hurts
>>
>>64131275
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

He has a source and its legit.
>>
>>64131354
There are 3 bugs, AMD is "only" affected by 2
>>
>>64131377
What a win for amd
>>
>>64131354
>google confirmed amd is effects by the bug
Raza is that you?
>>
>>64131397
see
>>64130690
AMD is at least not affected by the slowdown patch
>>
>>64131354
>>64131377

https://mobile.twitter.com/rhhackett/status/948676213505232897

You've been lied to.
>>
>>64130835
AMD have twice the cores/threads for the same or less cash you little threadlet.
>>
>>64131456
Amd is wrong and has been proven wrong by google
>>
File: intelplsgo.png (212 KB, 793x307)
212 KB
212 KB PNG
>>64131484
GET FUCKED KIDDO
>>
>>64131354
you need to learn how to english, pablo, before starting to make assumptions based on <the verge> """news"""
>>
>>64131484
Nope.
>>
File: Screenshot_1.png (64 KB, 975x434)
64 KB
64 KB PNG
>>64130672
Are you gonna cry?
>>
>>64131492
VERGEDRONES NUKED THE FUCK OUT


Now, enough with the shitposting. As a intel processor owner (like me), you blueshills should be mad at intel.
>>
>>64131538
Youre gonna cry when you get the intel patch performance hit and i will laugh
>>
>>64131517
>Meltdown

who cares, it's all about Spectre
>>
>>64131564
Ryzen not affected buddy, cry more. No amount of google shilling with change that
>>
>>64131610
Hahaha yes everyone is lying and amd is the only one telling the truth right
>>
>>64131626
AMD hasn't said a single thing, so far it's only intel saying AMD is affected too trying to save face
>>
File: t.JUSTnich.png (1.25 MB, 1002x1480)
1.25 MB
1.25 MB PNG
>>64131626
>>64131566
>>64131564

Nope. AMD is secure against all three.

>>64131492
>>64131456
Even the team who revealed them said AMD aren't vulnerable.

HAHAHAHAHAAAAAA
>>
>>64131492
>believe
>beLIEve

Your move, chuckles.
>>
File: 1480088996698.png (54 KB, 192x212)
54 KB
54 KB PNG
>>64130581
Is it fair to say that we're about to see some brakes applied to the fast-paced modern sensibilities and lifestyle of the internet age?
>>
>>64131661
Lie more hahahaha denial
>>
>>64131736
>>64131746
All the sources you need are in this thread, everyone who isn't Intel agrees AMD aren't impacted.
>>
>>64131517
The specific hack is tailored to Intel chip timing and there may be a similar leak that isn't discovered yet in AMD. Now people will begin to look for it.
>>
>>64131769
>It's there you just haven't found it yet
Do you also look for bigfoot in the woods with your friends
>>
>>64131764
Google said amd is effected
>>
>>
>>64131857
Checkm8 poozen shills
>>
>>64130581
AMD Pro CPUs aren't able to be affected.

Why?
AMD SME.
Where are the fucking Ryzen pro laptops, AMD?
>>
>>64130581
>Senior Editor at The Verge
HAHAHAHAHAHAHAHAHAHAHAHAHA!
AMD's statement:
To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time.

Nice try Brian.
>>
File: 1492566075931.png (55 KB, 287x275)
55 KB
55 KB PNG
>>64130581
>not being based macOS master race
>>
>>64131917
>root
>enter
>master race
>>
>>64131839
pablo, please learn english before starting to mess with kernel level code, or you might hurt intel even more
>>
>>64131354
See:
https://twitter.com/rhhackett/status/948676213505232897 and >>64131655
>>
im ready for the 40% slow down patch
shit fuck my shit up famalam
>>
>>64131914
>we believe there is a near zero risk to AMD processors at this time.

They believe there isn't, doesn't mean their isn't.

I believe I can fly, but it doesn't mean I can.
>>
>>64131839
>>64131492
>>64131354
W R O N G
>>
we won faggots
>>
>>64131956
I love how you 21 year old college kids try to sound smarter than you are
>>
>>64131975
That's a far cry from "our processors are vulnerable to these three exploits", which is Intel's statement. This is covering their ass just in case, but "near zero" is pretty fucking clear that they don't think it's happening.

>>64131917
>>64131995
You've still got Intel CPUs.

>>64132006
t. retard who can't read the Google team report
>>
>>64131995
MacOS is going to need a patch too retard.
>>
>>64131995
Apple uses Intel chips.
>>
Yes, and as of a few days ago everyone thought intel was secure.

/g/ is too full of fanboys for a seriosu discussion, /pol/ is better.
>>
>>64130581

Speak for yourself peasant. Who else /6502/ here?

LMAOing @ ur life
>>
>>64131960
kek
https://forums.aws.amazon.com/thread.jspa?threadID=269858
>>
>>64132006
>doesn't even know what a kernel is
>can confirm exploit Y it work on platform X because journalist Z said it so
don't kill yourself pablo, learn english instead
>>
>>64131917
macOS is affected as 100% of them run Intel chips. Knowing Apple nowadays, though, they'll take their sweet time patching this if at all.
>>
Phonefags BTFO. Why does this effect ARM, too?
>>
>>64132030
It was patched already "retard"
go look it up
>>
>>64130581

if this was real, AMD stock would be down 50000000000000000000% because AMD stock tanks easily, even when they revealed EPyc and Ryzen, their stock took a hit

kys Brian
>>
>>64130835
Im not installing the patch :^)
>>
>>64132071
It's patched already
>the state of linuxcucks
>>
>>64130581
Why would I click on Twitter, retard?
>>
>>64130727

>obscure AMD FX Pro product line that 20 people use today

kys sleazy intel shill
>>
>>64130952

this. it's literally a clown pretending to be a tech journalist
>>
>>64132099
And? The patch deployment isn't the issue, the issue is the patch causes a severe performance hit in certain applications
>>
>>64130997

this! Time to throw away my flagship phone that I bought last year and buy a new one that comes with the update at launch
>>
>>64132068
Hahahaha pajeet listen you dont even program for a living. Ryzen is effected by spector, sorry google had to burst yoir bubble
>>
File: 1514991339518.jpg (26 KB, 480x418)
26 KB
26 KB JPG
WITH JEWS
YOU LOSE

WE TRIED TO WARN YOU
>>
>>64132050
>>
>>64132099
The second exploit that effects all CPUs including ARM is unfixable as of yet besides a hardware swap
>>
>>64130952
He linked to Google's fucking blog.
GOOGLE'S.

He didn't say anything in his own words. He quoted GOOGLE'S TECH PERSONNEL.
>>
>>64131484

>trusting Google to be objective when they just bought Intel server processors worth billions of dollars to expand Google Cloud Platform just last year

LoL
>>
>>64132126
Apple won just accept it. Where is the performance drop then? Patched before anyone and no noticeable changes. Rekt fag
>>
>>64132126
>the issue is the patch causes a severe performance hit in certain applications
That's not an issue as of yet. Security mitigations are more important
>>
So we basically calculated trash the last decades?
>>
What is the second bug that affects all
>>
>>64132186
Like a true fanboy, only trust amd when theu have been proved to be liers time after time like the rest of them
>>
So if they know the patch will fuck everyone, why even roll it out?
>>
File: fg.png (21 KB, 840x140)
21 KB
21 KB PNG
>https://www.thurrott.com/hardware/149469/intel-says-recently-reported-security-flaw-overblown

Friendly reminder that DX9 is still actually broken on ayymd
>>
File: 1513177318179.jpg (31 KB, 470x470)
31 KB
31 KB JPG
>>64131467
And half the IPC Pajet
>>
>>64132192
You probably dont notice on an Apple Facebook machine
>>
>>64132148
why are you this butthurt, pablo, is it because you might have to go back to your country now that your h-b1 visa is going to expire and trump isn't allowing it to be renewed? learn english and read news from a reputable source instead of spamming broken english and links to fake news from """journalists""", you might be able to enter again
>>
>>64132222
quads have spoken
ayymd bankrupt and finished
B T F O
T
F
O
>>
>>64132241
Denials from the ayys
>>
>zero documented cases about any performance hits
top story is still "30% performance kill on intel"
>>
>>64132192
>Rekt fag
you're making it too obvious that you're just baiting
>>
why the fuck do all you fags act like AMD is some non-Jewish company? they have facilities here in Israel just like every major tech company because we're smart as fuck
https://www.haaretz.com/israel-news/business/chip-giant-amd-establishing-r-d-center-in-ramat-gan-1.365238
>>
MELTDOWN != SPECTRE

Meltdown is a Intel bug only
Spectre is on pretty much every modern processor that has speculative execution (Intel, AMD, ARM, PPC, Spark)
https://meltdownattack.com/#faq-systems-spectre

look shit up before talking you retards
>>
>>64132288
Have you not noticed amdshills are cancer?
>>
>>64132090
>vulnerabilities that aren't even entirely understood yet have been patched
lel
>>
File: .png (22 KB, 729x255)
22 KB
22 KB PNG
>>64132181
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Here's your blog kid. Basically only Intel is affected in actual use. AMD doesn't enable BPF JIT on default while Intel does, meaning Sceptre hardly affects AMD or ARM. Google and Intel are working closely on the damage control.
>>
>>64132222
That's what I was saying last night when this came out, people are trying to short sell stock and exaggerating to the naive. There's no reason the performance hits won't be fixed. This is about the processor bug and once you understand it you see that while this is a major flaw, it isn't like intel made some dumb mistake.

https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/

also, checked
>>
>>64132302
>Apple is so good they bent time
>>
>>64132288
intel is more jewish
>>
>>64132301
it's just fucking annoying
http://www.amd.com/en-us/who-we-are/contact/locations
they have location in Israel and multiple facilities in India, they're the same as any big fucking tech company
>>
>>64132302
Go look it up loonixfag
>>
>>64130672
From what I read through yesterday, Intel CPUs with PCID support should see a significantly lower performance impact, but from what I could tell that was introduced with Sandy Bridge back in 2011. Does Skylake offer some additional performance improvement here beyond just being a newer architecture?
>>
>>64130581
What the fuck happened, exactly?
>>
Why is this even a big deal? Tiny vulnerability that noone is smart enough to exploit effectively. Ten years and noone noticed or did anything.

It's fucking nothing.
>>
>>64132222

DX9 games work fine on WINE/Linux. Windorks BTFO!
>>
>>64132315
Reminder that most of the security researchers cited in that article have kike names so it's almost certain that it's worse for Intel than they say
>>
>>64132322
They hire indians too
>>
>>64132172
oh fuck
>>
>>64132330
There isn't anything to look up. No patching has been done.
>>
>>64130581
I think the only ones not affected are SPARC and POWER, right?
>>
AHAHAHAHAHHAHA AMDRONES ENJOY YOUR SHIT PERFS TOO
>>
I like how this thread is just obvious fucking corporate shills shilling shills.
>>
AMD chips are still affected lmao
>>
>>64132385
>>64132393
>>64132409
topical
>>
>>64132409
[citation needed]
>>
>>64132340

Intel fucked up again.
>>
>>64132222
https://twitter.com/CatalystMaker/status/948622475679752192

Outdated.

>>64132274
Did you miss the NVME SSD getting it's speed halved?
>>
>>64132430
>why do you need full-speed NVMe goy?
>>
File: 0f42dda4ed.png (273 KB, 618x568)
273 KB
273 KB PNG
another glorious nope.
>>
>>64132367
Because it was patched a month ago you dumb pajeet
>>64128708
>>
File: 1504679646656.png (53 KB, 571x618)
53 KB
53 KB PNG
>>64132452
>t-those independent researchers are a-all wrong g-goyim, t-trust us
>>
File: 1505370127732.gif (510 KB, 346x367)
510 KB
510 KB GIF
>>64132385
>implying I will install the intel patch
>>
>>64132452
>we believe
>>
>>64132464
>completely unrelated issue
At least you tried.
>>
>>64132471
>>64132474
The fucking Google team agrees.

>>64131492
>>64131456
>>
>>64132472
RANSOMWARE'D
>>
>>64132501
>google, a major tech firm that relies heavily on the effected intel processors to exist as a company
trust us goy
>>
>>64132485
Except that is it. How can you be so fucking retarded?
>>
>>64130581
And finally, you anons realize this. By this rate, security flaws are inevitable and it will be impossible to escape the botnet. Software and firmware have become to complex to minimize risks, much less work smoothly. Moreover, the increasing dominance of proprietary hardware with hidden components only further worsens this issue. In fact, the American intelligence agencies probably have thousands of zero days ready for all of us simple sheeps.
>>
>>64132534
So they pay their buddies back by saying only Intel is fucked? You're getting mixed up.
>>
>>64132542
Except that it isn't. How can you expect anyone capable of reading English to believe your lies?
>>
>>64132219
AMD and arm is susceptible to one, but is easily patched with no difference. Intel is vulnerable to all 3 and needs a massive overhaul.

Everyone needs a patch, but only intel will be getting screwed over.
>>
File: spectre.png (31 KB, 329x196)
31 KB
31 KB PNG
>>64132501
both of the things you just linked are from AMD people. from https://spectreattack.com/spectre.pdf is my picture, note this document is not made by anyone affiliated to AMD, Intel or Google
>>
>>64132393
IDK it just seems like fanboys.

I've got no idea why someone would be so fanatic about a CPU these days. Back when they were pushing clock speeds I could understand, but now it's pretty boring. GPU and HPC are exciting these days.
>>
>>64132425
I see.
And how is this news again?
>>
>>64131492
>>64132597
This one is from the Google report, not AMD. They only managed to find vulnerabilities in FX, according to their article.
>>
>>64132575
>I'll just keep lying and hope everyone is pretending I'm retarded
get back to shitting on the street
>>
Why does the patch decrease performance?
Is there no way to buy a new intel chip with the problem fixed and still retain performance?
>>
>>64132646
the people who publicly reported its existence first demonstrated it on Ryzen, gonna trust that over all this corporate jewry
>>
https://twitter.com/timgostony/status/948682862844248065
holy shit it is not looks like 30%, its fucking 150%
>>
>>64132665
Holy shit.
>>
>>64132665
Poo in the fucking loo Sanjay
>>
>>64132665
150 lol, when 100% slowdown mean its completely stopped
>>
>>64132665
Ok well fuck applying the patch.
I'll take my security risks. I'm not about to effectively ruin my CPU over this.
>>
>>64132646
Specifically, on APU processors, with a non-default setting, "eBPF JIT is on". Not quite equivalent to the "all processors" nightmare Intel has to deal with.
>>
>>64132665
Whoever said 30% was full of shit.
https://twitter.com/grsecurity/status/948170302286172160
>>
>>64132331
It saod skylake and onward wouldnt slow down less
>>
if its so bad then why didnt anyone use the exploit even though they had years of time to do it
>>
>>64132665
Yes dumb shit like multithread http servers are gonna be the worst.

Something like vidya might not feel anything at all. Wait until benchmarks.
>>
>mac perfectly fine
theres no better time to switch :^)
>>
>>64132665

POO ON CPU
>>
>>64132745
Who cares about fucking video games. This concerns real devs that deal with real problems
>>
>>64132745
I don't care about gaming though. I do care about datacenters.
>>
>>64132745
>multithread http servers are gonna be the worst
So nodejs will finally kill php, python and other forking shit?
>>
>tfw still running Intel Core 2 Duo™
>>
>>64132745
Nobody runs a game alone without other programs. You have your browser open you already need protection because javascript might fuck arround. If the other programs take more ressources because of this your game slows down. Not to mention the servers for online-games will be affected especially since they mentioned databases getting hit.
>>
>>64132646
FX PRO

http://www.cpu-world.com/CPUs/Bulldozer/AMD-FX-Series%20FX%20PRO-8800B.html

bulldozer mobile; I doubt there's even one laptop out there with it. Intel must've dug real hard to find this one.
>>
>>64132751
>mac perfectly fine
To a single variation of a bug with at least three variations.
>>
>>64130581
https://www.cnbc.com/2018/01/03/amd-rebukes-intel-says-flaw-poses-near-zero-risk-to-its-chips.html
>>
so this patch is going to send us back to like 2008?
>>
>>64132863
>bulldozer mobile
Jesus Christ, this conjures up some horrible images.
>>
>>64132863

Even then the eBPF JIT isn't enabled by default.
>>
>>64131204
>except Intel Itanium and Intel Atom
Is Itanium actually ourchips?
>>
>>64132225
Nope, they are within 5%, try harder 30%
>>
>>64132915
>us
No, just the poor fools that fell for the Intel meme.
>>
>pajeets are more effective at security and performance than American clean room engineers that learned at college for 4-6 years
>>
>>64132662
This.

For once maybe we did trust experts over corporate shills, there is incentive for both companies to lie, there is no incentive for unaffiliated security experts to do so, if the ones who actually brought these exploits to light say Ryzen is affected I trust that analysis.

So trusting fucking corporations.
>>
>>64132743
Because it was only discovered very recently, due to the extremely particular conditions it must set up to trick the cpu into revealing memory contents.

https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/

>>64132777
>>64132783
If that's the concern, you should understand that there will be optimizations like batching kernel calls, both from the OS and within scripting languages. They haven't had time to do this, their primary concern is security.
>>64132788
I don't know for sure, but I suspect some languages will be hit MUCH harder than others, but they'll roll out optimizations soon.
>>
>>64132956
Both companies are pajeet central.
>>
>>64132972
>I don't know for sure, but I suspect some languages will be hit MUCH harder than others, but they'll roll out optimizations soon.
Php/python/ruby etc creates new process to serve new connection. Node creates only 1 process for all incoming connections. So it looks like nodejs will shine now.
>>
>>64132969
>we shan't believe corparate lies goys, guise.
>exorts us to blindly believe intel throwing shit in the fan

how about no.
>>
>>64132823
With JS it's tough to say, there might be a way, but the hack has to do with specific sequences of operations people write in assembly (+ kernel call), and JS is another layer above that. From what I understand this relies on reading the high resolution clock to detect cache flushing, which JS doesn't even have access to.
>>
File: nope.jpg (118 KB, 928x294)
118 KB
118 KB JPG
Don't believe them. AMD has their own version of the requisite backdoor embeded in all chip designs in the past decade.
>>
File: 1513864025014.jpg (40 KB, 480x360)
40 KB
40 KB JPG
I'm fucking pissed this is about predictive execution
>>
File: 1358097981236.gif (18 KB, 378x231)
18 KB
18 KB GIF
I'll wait for the patch. if my shit gets turtled I will buy a ryzen and motherboard combo I've had my eye on the very next day

Fucking hell its like intel just keeps trying to give me reasons to jump ship

also the thought of re installing all this shit at this point in my life is kind of horrifying.
>>
>>64133043
Then you're right. I believe multithreaded apps can be optimized by the OS, but multi processes may be harder or impossible.

Do python apps really fork like that? I know they have threading, but forking is expensive to begin with, it's hard to believe anyone would still do that.
>>
AMD official statement posted now:
https://www.amd.com/en/corporate/speculative-execution

Intel-aviv kikes btfo
>>
>>64133261
The performance loss isn't really noticeable in non-server tasks, but it's there.
It's there, and forever will be.
>>
File: 1508714919764.gif (2.53 MB, 500x315)
2.53 MB
2.53 MB GIF
>>64130581
>Since Intel was infected that means EVERYONE was infected
lmao stay fucked
>>
File: 1492628161603.jpg (33 KB, 512x288)
33 KB
33 KB JPG
>>64133406
>Intel-aviv
>>
>>64130952
This and only this.
>>
I'm in position to install the Windows 10 patch right now, and I was smart enough to disable auto updates so they aren't forced on me. (and yes, I know I welcome a bunch of /g/ users coming in and saying "you weren't smart enough to avoid winblows 10." I accept that)

The question is this: should I update, or should I wait? I go to alot of websites, so not updating isn't an option.
>>
>>64133533
>should I update
Yes, you should update by removing that hardware backdoor in the CPU slot.
>>
>>64133556
I'm low on money right now, so I can't even afford a decade old AMD card. So buying a new card is out of the question.
>>
So all we need now are some Russians/chinks/whatever to exploit this and we hit the reset button, correct?
>>
File: d8c4975268.png (59 KB, 1196x300)
59 KB
59 KB PNG
>>
>>64132154
>/pol/ is right again
>>
>>64132730
don't consoles have APUs in them and aren't based on the Zen architecture? I wonder if this effect those?
>>
>After all this years bulldozer will finally be faster than Sandy Bridge
Is this the ultimate fine wine™?
>>
There's gonna be some lawsuits flying around every company now. I think they will fix it, but fuck this is gonna get ugly. Maybe this will be a change for smaller alternatives to get a better foothold in the market. I hope so.
>>
>>64133196
Predictive execution is shit IMO. It's CPU manufacturers pushing the limits of single threading using an overly complicated design when they reached physical limits. It meant better benchmarks, but it also meant bigger cpus.
>>
>>64131173
it will still get patched. its' ridiculous, I know, but that's how things are.
>>
>>64133976
no it didn't, stop talking out of your ass
>>
>>64132915
yes, because AMD will also get patched.
tl;dr timeline:
- bug discovered
- patch that enables it on ALL hw comes
- amd says not affected
- patch proposal that removes AMD
- patch never gets merged, it's enabled on ALL
>>
dude there is a fucking proof of concept up on github right now why doesn't anyone care

https://github.com/Eugnis/spectre-attack/blob/master/Source.c
>>
>>64132933
Used Itanium price skyrockets.
>>
>>64134048

HOLY SHIT GET OFF THE INTERNET RIGHT NOW
>>
>>64134003
You're saying all this branch prediction didn't lead to bigger cpus? You could argue the tradeoff is worth it, but it's not arguable that it didn't make cpus more complex and bigger.
>>
>>64134169
is this sarcasm
>>
>>64130727
>These vulnerabilities
This is the key word. He is addressing many vulnerabilities, not this specific one in order to lump everyone in there.
>>
File: meltdown.png (21 KB, 642x472)
21 KB
21 KB PNG
I've been following this for the last day or two, mainly because I just recently upgraded my desktop, and I'd hate for those upgrades to go to waste.

PERFORMANCE:

A couple of things that are certain so far :
- Databases that manage large amounts of files/information will have the largest dips in performance. This includes servers/cloud services, and we could potentially be impacted heavily from a consumer POV

- Personal rigs and non-powerusers will "not" noticeably be affected by performance dips when patches go around. This is mainly a result of there not being enough interaction with the CPU.

BENCHMARKS:

Several benchmarks have been published so far documenting performance hits.
Here is the affect on a Linux system: https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2
Several benchmarks, in particular FS Mark, show massive hits.

This, however, stands at odds with a windows benchmark conducted by ComputerBase: https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheitsluecke/#update2
This benchmark shows little to no performance dip for a windows computer post-patch, which leads many people on /g/ to speculate that the tested computer does not have the patch installed.
Other users have pointed out that the version the testers used (17063) has had the fix since November (https://twitter.com/aionescu/status/948427734845239298 (embed)). Nevertheless, users are unconvinced by the benchmarks because
1) they are clearly different from what's reported by Phoronix for linux systems,
and 2) They do not use similar benchmarks as those used by Phoronix.

Lastly, one macOS user compared his pre and post patch scores for GeekBench. It also seems that Apple had already rolled out a Meltdown fix before news hit.
>>64130643 (Cross-thread)
Anon's score goes from 4500 single core to 3868 single core, which is a reduction of about 15%. Multi-core score barely changes.

Hopefully more users will provide their benchmarks.
>>
>>64131857
>>64131872
Spectre is not Meltdown. Spectrev1 has been patched in software, and Spectrev2 has not been replicated on any AMD hardware and is likely to complex for anyone to reliably exploit.
>>
>>64134032
A month from now:
AMD patch included in mainline
AMD performance no longer affected
>>
>>64135324
It's already in mainline.
https://github.com/torvalds/linux/commit/00a5ae218d57741088068799b810416ac249a9ce#diff-678874d00bf0df04f6f427f16f1dea36R926
>>
>>64134032
AMD's exclusion got merged on Linux, don't know about Windows, probably not since that is Intlelshill central and will gimp AMD CPUs on purpose.
>>
>>64135373
Oh. Then why do I keep seeing retards saying it's been rejected or hasn't been included?
>>
File: 1466162607618.gif (1.03 MB, 268x274)
1.03 MB
1.03 MB GIF
why are people spazzing over this? doesn't intel cpus basically have an NSA backdoor in every chip?
>>
>>64135448
intel shills
>>
>>64135460
there is a big difference between rumor and fact.
>>
File: DHamBltWAAE0gOJ.jpg (52 KB, 1027x649)
52 KB
52 KB JPG
I wonder if he's ok?

>work for amd, listen to daily screeches of amd is finished and bankrupt
>starts working for intel, one month later intel is finished and bankrupt.
>>
>>64130581
wrong

only intel is affected by meltdown, which is the most serious of the exploits
>>
>>64135505
He probably gives no fuck, since GPU=/=CPU.
>>
>>64135529
>tfw he fronts the branching out of inteleon technology group, which will become the undisputable gpu leaders from the remains of a burned down intel cpu division.
>>
File: e37.png (24 KB, 425x404)
24 KB
24 KB PNG
>>64135529
you also, entirely.
>>
File: 1371695755270.jpg (30 KB, 536x602)
30 KB
30 KB JPG
"A bug that poses a huge security risk"
TRANSLATION: A zero day backdoor exploit the FBI, CIA, & NSA have known about for 10 years.
>>
>>64135624
pretty much this
>>
>>64135624
>>64135932
nah, the agencies have always had their own lill backdoor. This was intel's alone. Guaranteed performance increase in keeping a known liability untouched whit the benefit of their won private backdoor. Thos pesky kids at google and amzon just had to meddle on their business and ruin it all.

now they lost the performance advantage, their own private backdoor and they have a PR nightmare on their hands.
>>
>>64131358
And your and his reading comprehension can't see that the Spectre exploit works on non default states for the non Intel CPUs
>>64133729
They aren't based on Bulldozer, however they're OoO and speculative, so they probably are vulnerable to some Spectre variant
>>
>>64130940
>Google confirmed amd is effected

Google only tested Faildozer chips (FX-8320 and A8-9600).

We haven't seen confirmation that Ryzen is affected or not.
>>
>>64130581
>Google dock has no information on it working on v2 or v3 on AMD
How are people saying that it's 2/3 bugs that work on AMD?
>>
>>64136252
More importantly, they only tested FX chips with non-default software configuration.

And more importantly than that, this is only true for one variant of the Spectre attack, which has already been patched. This is not related to Meltdown.
>>
>>64130672
Which is bullshit. Phoronix tests show 8700k is very well fucked.
>>
>>64132616
They recursively fucked up everything up to the Pentium Pro, only pre 2013 Atom and Itanium are spared
>>
>>64130581
AMD doesn't have this problem.
enjoy being fucked INTLEL fags
>>
>>64135460
An NSA backdoor is a bit less damaging than ring 0 access for any pajeet javascript.
>>
>>64136391
Yep, noscript for me from now on.
>>
For the millionth time, read the fucking blog post in its entirety before discussing what affects what, it's stated clearly.
>>
>>64130672
Horse shit. Benchmarks have proven this blatantly false
>>
I have a linux server with nothing important on it, just a minecraft server and plex. If I don't update it, what kind of damage can it do to other machines on the network, assuming all other machines are patcehd or run AMD?
>>
>>64137136
If all you do is run minecraft on it what are the chances it would ever even stumble upon malicious code using this exploit? Not too high
>>
>>64137102
I think they men theoretically they could work around it better, not that they already have.
>>
>>64130727
>>64130581
There are 3 vulnerabilities.

AMD is affected by 1. Intel is affected by all 3.

So the politically correct term or rather Intel shilling term is "all CPUs are vulnerable and thus all are same"
>>
File: 1514989572614.png (495 KB, 1070x601)
495 KB
495 KB PNG
>>64130581
b---b---but our big daddy Intel said that _all_ x86 are affected!
>>
>>64130903

>Researchers from Google's Project Zero Team, Cyberus Technology, Graz University of Technology, University of Pennsylvania and the University of Maryland, Rambus, and University of Adelaide and Data61, discovered critical flaws in a method used by most modern processors for performance optimization that could allow an attacker to read sensitive system memory, which could contain passwords, encryption keys, and emails, for example. The vulnerabilities affect CPUs from Intel, AMD, and ARM, according to Google.

https://www.darkreading.com/endpoint/intel-processor-security-flaw-prompts-kernel-makeovers-in-linux-windows/d/d-id/1330738
>>
>>64131995
> This is what appletards believe

God this planet is fucked
>>
>>64131995
>literally only intel cpus
if by "winning" you mean "most affected line of computers", then sure, i guess
>>
wtf time to throw my thinkpad out the window
>>
Should we all be panicking? How easy are these vulnerabilities to exploit?
>>
>>64139397
Panicking is something you should never do.
>>
>Guy continues to get replies citing new information or git commits that AMD is not impacted by this
>Keeps stomping his feet and linking blogspot posts or some stupid shit

This guy seems like a complete retard, where do I pick up my "security expert" badge means I clearly know as much as this shit eater
>>
>>64131995
>we did it reddit
>>
File: fucked.png (78 KB, 1688x1049)
78 KB
78 KB PNG
>>64130581
>>
Still gonna buy intel just to piss amd users since i have money. Thank you based Intel.
>>
>>64140049
make sure you get two to cause extra butthurt and you cover your performance loss in the process
>>
>>64130581
/ff
>>
>>64140026
>spectre is the same thing as meltdown!!
loling @ your purchase
>>
>>64140064
>make sure you get two to cause extra butthurt
Will do. Even if Intel crippled their cpus they are still better than ayymd
>>
so for intel they have to stop to deliever their cpus and they have to make a new cpu layout from the scratch right?
>>
>>64132788
>>64132972
Does Microsoft's IIS fall into this? How hard will it be hit?

>>64140026
So is Ryzen affected by Spectre or not?
>>
>>64130581
It only mentions Spectre though. Meltdown (which is severe before and after patching) are not
>>
it gets worse...

https://xenbits.xen.org/xsa/
>>
>>64140251
>So is Ryzen affected by Spectre or not?
It has a slight chance of being affected by variant 2, nobody's managed to prove it though. Google researches found old FX series processors were affected by variant 1 with weird configuration settings though.
>>
>>64130609
They're not affeected by meltdown, but there was 3 exploits released. AMD is affected by one of them
>>
>>64132662
Demonstrated? Link?
>>
Will open source hardware ever see it's light of day of at least being niche market?
>>
>>64130581
ARM KEKS BTFO!!!!
>>
>>64136252
Just tested it and confirmed myself. Is there gonna be a windows update patch?
>>
File: 1514982835108.jpg (58 KB, 700x700)
58 KB
58 KB JPG
>>64130940
>>64138454
Dont you guys know how to fucking read?
He specified adm arm x86 only, the quotes dont specify shit
That's why u will never get out of pajeet lvl
>>
>>64140576
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
>>
File: 1423698287544.gif (2.64 MB, 320x240)
2.64 MB
2.64 MB GIF
>>64140829
>last gen laptop CPU in a non-default configuration
>>
File: 1506460579665.png (100 KB, 320x320)
100 KB
100 KB PNG
>>64140829
>variant 1 confirmed on AMD CPU that literally nobody used
>variant 1, 2, and 3 on literally every Intel CPU
>>
>>64131769

No, amd handles loads in speculated code differently than intel by design. IIRC it was something like amd does not perform a speculative memory operation from a different execution context, whereas intel does. Intel basically zeros the results from the illegal access rather rather than not executing it. But the effect of the speculative execution remains on its caches and the actual value in ram can be inferred by measuring timing information.

Intel has a more aggressive out of order design and it has bitten them in the ass by this new attack. There is a posting by Linus where he calls intel out that this is really an engineering oversight / defect by them rather than the chip merely working as designed (which it is / does).
>>
>>64139397

I watched a video where linux kernel code was read from javascript. update asap.
>>
>>64130997
>>64132133
>Apple shills working overtime in a thread that is about processors

My phone came out in 2015 and I've been on 8.1.0 (official) for a month and a half already and I'll get this update. :) Apple cucks btfo.
>>
>>64141068
Is iPhone vulnerable? Nobody seems to know, even googling "iphone cpu exploit" from todays date just shows up a bunch of news articles not mentioning iphone, and once you ctrl+f iphone and you see the footer of the page says something like "download our iphone and android app!"
>>
>>64141278
iPhones with Ax processors aren't affected and some custom Samsung processor .
Amd isn't affected.

But the snapdragon shit and intel cucks are affected.

Intel Cucks and
>>
Intel is far more fucked than AMD and ARM
>>
>>64141356
I'm pretty sure they'll be affected by Spectre, at least.

Some ARMs are affected by Meltdown, or variants of Meltdown (there's a 3a now), but I haven't seen any data of the Ax processors being tested yet (possibly the pain of actually testing the devices, though perhaps someone could make a Javascript page to test it, though that is reliant on the Javascript engine playing along as much as the CPU being vulnerable).
>>
File: IMG_1656.jpg (214 KB, 600x657)
214 KB
214 KB JPG
Who /refuse to update/ here for the sake of performance ?


guess my password all you want. I have two factor .
>>
Is it KB4056898 for 8.1?
>>
>>64142165
>guess my password all you want
They can literally just read it out of memory, no guessing needed.
>>
>>64130581
https://twitter.com/tomwarren/status/948688117711753216
Not meltdown. Whose fix causes a 30% hit to performance.

These Intel shills in the media are a fucking disgrace.
>>
>>64142267
You can't hack phone sms
>>
File: 1515046611979.jpg (65 KB, 679x711)
65 KB
65 KB JPG
>>64130581
>>
>>64132745
Good luck streaming anything.

AMD is going to destroy Intel in 2018, this is fucking BRUTAL.
>>
>>64142321

Not true, but it's not that easy.
>>
>>64142399
Then I can sue the phone company for security failure
>>
>>64142321
Wasn't t-mobile getting in trouble for giving out h3h3's sim card like multiple times after he told them not to?
>>
>>64142524
this is how skids get access to twitter/youtube etc platforms with 2factor. they will get ahold of an eceleb's phone number, grab a sim for their carrier and call up the carrier claiming to be X person, claiming an issue with their sim. ask the carrier to port the number to the skid's temporary sim card. then they pop it in their phone, use that eceleb's recently gained phone number to bypass 2step
>>
>>64142345
this.

I can't believe all the fake news targeting AMD. There is some serious damage control by Intel cucks going on
>>
i5 3570K owner here, I downloaded the latest update from MS catalog, I've noticed I'm getting exactly 1 less FPS on my the same spot in Fagout4 on my stare test bench save. Better sell intel stocks now, it's all fucked, we'll be all dead by tomorrow, I can hear the earth cracking and the devil laughing from the cracks.
>>
>>64143054
>1 less FPS
intelfags will defend this
>>
>>64135460
Now this backdoor available not only to NSA but for everyone.
>>
>>64141041
Post video
>>
>>64142345
>only linux
So if I'm using AMD on Windows I'm safe?
>>
>>64143054
Also an i5 3570k owner. I didn't expect much performance loss in games or normal rendering. It's supposedly mostly I/O and other system/server type stuff.
At most my torrenting and archive management will be fucked. But I haven't noticed any trouble so far with those either.
>>
>>64143054
4790k owner here. No visible performance drop in the games, even rpcs3 emulation doesn't seem to get hit judging by DeS. Noticing some heat increase though, but i'm not sure if it's from shy shitty ageing fan or the fix itself.
>>
>>64141068
i have never owned an apple device but have multiple android devices and none of them got updates for more than a year. im not saying that its a bad thing tho because android has only got worse from what it was when i bought my devices.
>>
>>64141068
not everyone wants to pay $1000 for a phone to get more than few months support.
>>
>>64142594
why do the carriers do that then? must be really ignorant about security or retarded.
>>
File: file.png (80 KB, 1210x582)
80 KB
80 KB PNG
>>
>>64132350
javascript in your browser can read your passwords and sheeeit

browser patches are reducing the accuracy of timers and stuff to make it more difficult
>>
>>64147091
>inb4 for non-retards the problem can be solved on browser level
still installed the update but still have doubts about it
>>
>>64131354
Torvalds removed KPTI on AMD systems lamo
the absolute state of Intel employees
>>
>>64136324
>pre 2013 atom
break out those 2008 eeepc's and ideapads boys
or load up on c201's with libreboot
>>
>>64147091
good thing that i dont store passwords in my browser. im not installing this shit.
>>
What are the oldest versions of Intel's chips that are affected by this shit?
>>
>>64132222
It's been broken by windows . I can't insert my old x9 games and expect them to play on win 10
>>
File: 1509715127379 - Copy.png (113 KB, 457x458)
113 KB
113 KB PNG
Whiter than you A(h)M(e)D

>>64130682 >>64131173 >>64142345 >>64140813 >>64138409 >>64135159 >>64133485 >>64133442 >>64132425
>>
Reading the emails going around in my company, and they believe the vulnerability exists in both Intel and AMD. No mention of the fact that meltdown does not affect AMD.

I work in networking not server, or else I'd raise this point. Either ways the Intel jews have successfully muddied AMD's name and AMD needs to do a better job of communicating this does not affect them. E
>>
>>64146292
>Noticing some heat increase though
I actually take that back, my retarded ass launched the fans on half speed.
>>
So as I get it, Meltdown is "oh shit nigga they can flash your bios with 16MB of dolphin porn from a mud hut in Cambodia" except it's already patched and Spectre is "basically nothing".
>>
>>64147293
some are fighting the good fight
>>64147092

while others such as reuters, bloomberg in the non-tech industry are keeping it real close to intel's script. And from what i've already read in tech specific sites, some like TH are simply being real good boys (((for awesome goodboy points))), while tpu, pcper are a bit neutral chaotic.
>>
File: Capture.png (23 KB, 606x204)
23 KB
23 KB PNG
thse people
>>
Is the yorkfield line affected?
>>
>>64147462
Everything P6-onwards is affected.
>>
>>64147293
these people probably only read the intel pr article.
>>
>>64147168
fuck yeah, the porn on my HTPC is secure!
>>
File: 314761.jpg (26 KB, 225x350)
26 KB
26 KB JPG
>>64147168
Time to grab my Aspire One




Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.