[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

DaveFroble davef at tsoft-inc.com
Tue Jan 2 21:59:41 EST 2018


Simon Clubley wrote:
> On 2018-01-02, johnson.eric at gmail.com <johnson.eric at gmail.com> wrote:
>> On Tuesday, January 2, 2018 at 11:20:30 AM UTC-5, Stephen Hoffman wrote:
>>> There's speculation around a potential security vulnerability and 
>>> related information embargo, involving various Intel x86-64 processors, 
>>> in the implementations of memory management and speculative execution.
>> Hopefully a similar vulnerability does not exist in Itanium. Seems
>> unlikely as they are different architectures. 
>>
> 
> What you should be worried about is the possibility of deliberate
> backdoors inserted in CPU architectures by the intelligence agencies.
> 
> Simon.
> 

Do you really think they could get away with that?  Remember the Sony root kit? 
  Someone will discover any such, and the vendor just might go out of business. 
  Even Intel.  Trust is a hard thing to earn, and oh so easy to lose.  Once 
lost, almost impossible to recover.

As far as that goes, any responsible chip mfg would just refuse to do such. 
What's the NSA to do then?  It'd go public, and, can I mention Edward Snowden?

But, then, I'm not into conspiracies ...

-- 
David Froble                       Tel: 724-529-0450
Dave Froble Enterprises, Inc.      E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA  15486



More information about the Info-vax mailing list