Intel hid Meltdown & Spectre vulnerabilities from the Goverment & Public

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@themarkymark·
0.000 HBD
Intel hid Meltdown & Spectre vulnerabilities from the Goverment & Public
https://i.imgur.com/i5eAPot.png


Most modern processors are vulnerable to a new exploit called Meltdown and Spectre.  As data is being processed in the CPU should be safe from snooping, but it was discovered this is not entirely the case.   Originally discovered by the Alphabet company (Google), the vulnerability affects Intel, AMD, and ARM processors as far back as 1995.

Google Project Zero team reported the vulnerability and gave 90 days before it was going to release their findings.  This should give chip developers enough time to release a patch and fully disclose the vulnerability.

Intel held off reporting the vulnerability until after public media released information on it.  They also refused to release information to US-CERT (US Computer Emergency Readiness Team), the largest most well-known security reporting organization.

>Intel said it did not inform government officials because there was "no indication that any of these vulnerabilities had been exploited by malicious actors," according to its letter.

Most systems and modern devices have released patches for both Meltdown and Spectre fairly quickly after news broke.   Although no known malware has exploited these vulnerabilities yet, this is likely the most dangerous vulnerability in a long time.  It is not limited to one manufacturer and many devices will never receive a patch or an update and modern Anti-virus solutions are unlikely to be able to detect it.

The fix requires additional checks for modern processors which incurs a significant performance drop of around 5-15% depending on the device.  There is significant overhead to patch this vulnerability so data isn't leaked.   Many service providers have provided patches for hosted servers and required stagged downtime during the month January.

Microsoft Windows, Linux, and macOS have all released patches for these vulnerabilities and you will notice a performance drop after applying them, in general, expect at least 5% loss in performance.

You can see Meltdown in action here:
https://www.youtube.com/watch?v=RbHbFkh6eeE

If you want to read more about these attacks or look at the whitepapers, you can find more information [here](https://www.youtube.com/watch?v=RbHbFkh6eeE).

# <center>  [Why you should vote me as witness](https://steemit.com/witness-category/@themarkymark/why-you-should-vote-for-themarkymark-as-witness)  </center> #
<center>https://steemitimages.com/DQmcWxV1dpA1eAtw2ipwZiWZkydyVNU5LaLa2Ak1GUnbGmS/The-Marky-Mark.png </center>

<center><sub><sub> X48EJ </sub></sub></center>

![themarkymark.png](https://steemitimages.com/DQmVpwMxWTYDVum2dXcVRBLwHqHZh2Sr6DDHAFwDeeTG2YK/themarkymark.png)


</br>

# <center> My recent popular posts </center> #

[The truth and lies about 25% curation, why what you know is FAKE NEWS](https://steemit.com/curation/@themarkymark/the-truth-and-lies-about-25-curation-why-what-you-know-is-fake-news)
[WTF is a hardware wallet, and why should you have one?](https://steemit.com/bitcoin/@themarkymark/wtf-is-a-hardware-wallet-and-why-should-you-have-one)
[GINABOT - The Secret to your Sanity on Steemit](https://steemit.com/ginabot/@themarkymark/ginabot-the-secret-to-your-sanity-on-steemit)
[How to calculate post rewards](https://steemit.com/steemit/@themarkymark/how-to-calculate-post-rewards)
[Use SSH all the time? Time for a big boy SSH Client](https://steemit.com/linux/@themarkymark/use-ssh-all-the-time-time-for-a-big-boy-ssh-client)
[How to change your recovery account](https://steemit.com/steemit/@themarkymark/how-to-change-your-recovery-account)
[How curation rewards work and how to be a kick ass curator](https://steemit.com/curation/@themarkymark/how-curation-rewards-work-and-how-to-be-a-kick-ass-curator)
[Markdown 101 - How to make kick ass posts on Steemit](https://steemit.com/steemit/@themarkymark/markdown-101-how-to-make-kick-ass-posts-on-steemit)
[Work ON your business, not in your business! - How to succeed as a small business](https://steemit.com/business/@themarkymark/work-on-your-business-not-in-your-business-how-to-succeed-as-a-small-business)
[You are not entitled to an audience, you need to earn it!](https://steemit.com/steemit/@themarkymark/you-are-not-entitled-to-an-audience-you-need-to-earn-it)
[How to properly setup SSH Key Authentication - If you are logging into your server with root, you are doing it wrong!](https://steemit.com/sysadmin/@themarkymark/how-to-properly-setup-ssh-key-authentication-if-you-are-logging-into-your-server-with-root-you-are-doing-it-wrong)
[Building a Portable Game Console](https://steemit.com/raspberrypi/@themarkymark/building-a-portable-game-console)

[![](https://steemitimages.com/DQmPkQhAQceC7aHr4Gy5GKv7LMoiy47P7PyaNCeZBHMpFke/white-bg-with-drop-shadow.gif)](https://v2.steemconnect.com/sign/account-witness-vote?witness=themarkymark&approve=1)
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,