203
AMD’s trusted execution environment blown wide open by new BadRAM attack
(arstechnica.com)
This is a most excellent place for technology news and articles.
Looks like AMD has already patched it, also appears to affect older Intel versions of the same tech concept but not current generations.
Only really affects guests in multi tenant hypervisor environments, requires physical access to the hypervisor, requires external physical hardware, requires booting the host with said hardware attached, at some point this level of compromise is already absurd. This kind of research is important and shows that we still need to limit out level of trust with host providers but I don't think anyone needs to panic.
Kinda annoyed with Ars for perpetuating this trend of dramatized security vulnerability names and descriptions.
Ars went the way of Toms a while ago for me. There's some decent stuff to be found but most of it is click/rage bait.
I still think it's generally more good than bad and I appreciate they provide an authenticated ad free RSS feed for subscribers, but I think this was one of their worst headlines.
If someone breaks into your home and shits your pants then they might be able to make you smell like shit.
Legit question: is the “he/she shits your pants” expression and generally shit verbiage own vogue or something?
I have to ask because I keep seeing it and I’m pretty sheltered from corporate social media (and probably larger Internet cultural trends overall).
It's been a meme for a while I think. If I had to guess I'd say it started with some Tumblr thread. Obviously not entirely suitable for normal-speak, which is why it's on lemmy instead of a workplace slack channel.