How the industry-breaking Spectre bug stayed secret for seven months - The Verge


32 bookmarks. First posted by toph january 2018.


How an industry-breaking bug stayed secret for seven months — and then leaked out
TheVerge  Computer_Security  Security  Web_Security  Meltdown  Spectre 
february 2018 by GameGamer43
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by badboy
How an industry-breaking bug stayed secret for seven months via Instapaper http://ift.tt/2qU0fTZ
IFTTT  Instapaper  longreads 
january 2018 by chetan
How the Meltdown and Spectre vulnerabilities stayed secret for 7 months but were eventually revealed after rumors and suspicious Linux kernel patches surfaced
january 2018 by joeo10
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by disnet
Keeping Spectre secret - Feedbin Starred Entries for tpsavard@gmail.com
ifttt  feedbin 
january 2018 by tpsavard
RT : the project zero team forgot to tell CERT about the meltdown/spectre exploit until it was already public 🤦
from twitter_favs
january 2018 by burritojustice
How an industry-breaking bug stayed secret for seven months — and then leaked out
security  hardware 
january 2018 by jorgebarba
Intel knew about the Meltdown bug for seven months.
january 2018 by leolaporte
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by nertzy
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by stevenbedrick
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a problem with their chips, together with his colleagues Daniel Gruss, Moritz Lipp, and Stefan Mangard. The vulnerability was both profound and immediately exploitable. His team finished the exploit on December 3rd, a Sunday afternoon. Realizing the gravity of what they’d found, they emailed Intel immediately.
security  hardware 
january 2018 by Gwendoux
How an industry-breaking bug stayed secret for seven months — and then leaked out


Nice summary of the timeline around Meltdown and Spectre.
security  hardware  kernel 
january 2018 by micktwomey
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by zsoltika
With Meltdown and Spectre, multi-party coordination broke down and the secret spilled out before anyone was ready. That early breakdown had consequences. After the release, basic questions of fact became muddled, like whether AMD chips are vulnerable to Spectre attacks (they are), or whether Meltdown is specific to Intel.
digest 
january 2018 by iandick
When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a…
from instapaper
january 2018 by toph