[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Hardened toolchain
From: |
Katherine Cox-Buday |
Subject: |
Re: Hardened toolchain |
Date: |
Thu, 28 Apr 2022 12:41:07 -0500 |
User-agent: |
Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) |
Aurora <rind38@disroot.org> writes:
> Katherine Cox-Buday <cox.katherine.e@gmail.com> writes:
>
>> Everyone has different threat models and needs. A lot of computers
>> have CPU speculative execution attack mitigation disabled because
>> those types of attacks will never affect those computers, and it
>> reduces the performance of the CPU a lot.
>
> There are multicore processors made in the last decade or two that
> aren't affected by speculative execution vulnerabilities?
They are vulnerable to them, but not necessarily affected by them.
Consider a computer not networked to the internet and only running
trusted workloads (e.g. scientific HPC, etc.). This is why acknowledging that
everyone has a different threat model is important.
I hope this helps to clarify.
Sincerely,
--
Katherine
- Re: Hardened toolchain, kiasoc5, 2022/04/14
- Message not available
- Message not available
- Message not available
- Message not available
- Re: Hardened toolchain, jbranso, 2022/04/15
- Re: Hardened toolchain, Zhu Zihao, 2022/04/15
- Re: Hardened toolchain, raingloom, 2022/04/15
- Re: Hardened toolchain, Katherine Cox-Buday, 2022/04/26
- Re: Hardened toolchain, Aurora, 2022/04/28
- Re: Hardened toolchain,
Katherine Cox-Buday <=
- Re: Hardened toolchain, Aurora, 2022/04/28
- Re: Hardened toolchain, Vagrant Cascadian, 2022/04/28
- Re: Hardened toolchain, Aurora, 2022/04/28