• 6 Posts
  • 78 Comments
Joined 2 years ago
cake
Cake day: June 7th, 2024

help-circle




  • The next three steps in the code are:

    • Enabling IBRS (indirect branch restricted speculation)

    • Untraining the return stack buffer

    • Clearing the branch history buffer

    These are there to mitigate against speculative execution attacks, such as spectre (v1 and v2), and retbleed. Speculative execution is an optimization in modern processors where they predict the outcome of branches in the code and speculatively execute instructions at the predicted path. When done accurately, this significantly improves the performance of the code.

    It’s like one time someone came through your house and stole all the valuables from every room. Now you have to lock/unlock every single interior door as you walk from room to room.

    This is why we can’t have nice things.














  • Absolute horseshit. Bulbs don’t have microphones. If they did, any junior security hacker could sniff out the traffic and post about it for cred.

    The article quickly pivots to TP-Link and other devices exposing certificates. That has nothing to do with surveillance and everything to do with incompetent programming. Then it swings over to Matter and makes a bunch of incorrect assertion I don’t even care to correct. Also, all the links are to articles on the same site, every single one of which is easily refutable crap.

    Yes, there are privacy tradeoffs with connected devices, but this article is nothing but hot clickbait garbage.