Jump in the discussion.

No email address required.

Phew luckily I'm using ARM chips

Jump in the discussion.

No email address required.

im safe with my i 2600k

:gigachad2:

Jump in the discussion.

No email address required.

KING

Jump in the discussion.

No email address required.

I'm moving back to good ol' pen and paper and my Speak & Spell :marseysweating:

![](/images/16576469439785337.webp)

Jump in the discussion.

No email address required.

That thing is absolutely riddled with CVEs. I've spent the last 20 years trying to figure out how to achive RCE on Speak & Spell. You have been warned

Jump in the discussion.

No email address required.

It's over for me :marseyraging:

Jump in the discussion.

No email address required.

tl;dr: if there is a virus on your computer it can get data from your computer.

Jump in the discussion.

No email address required.

It’s more of a concern on cloud hosting providers where you’re sharing a computer with many other people.

Thankfully JS timing calls were nerfed but you could’ve exploited a Spectre-class attack in JS prior.

Jump in the discussion.

No email address required.

sucks to be renting a shitty generic fraction of a server.

Jump in the discussion.

No email address required.

:marseys#hrug:

I feel like cloud hosting has proved it’s usefulness at this point.

Jump in the discussion.

No email address required.

:#marseytroublemaker:

Snapshots:

Jump in the discussion.

No email address required.

we do a little hacking

Jump in the discussion.

No email address required.

Whelp.

![](/images/1657649049191389.webp)

Jump in the discussion.

No email address required.

Thank god I use DOS on a pentium processor :marseyglow::marseyglow::marseyglow:

Jump in the discussion.

No email address required.

I used to care about this until I learned that it's so time-intensive that very few would use this against me.

Jump in the discussion.

No email address required.

The only processor not vulnerable to exploits is the one that doesn't work. Like Kirin.

Jump in the discussion.

No email address required.

older

Zen 1, 1+ and 2

Frick, that's not old at all

Jump in the discussion.

No email address required.

It's the hash. Unless you have an r-slured password I don't see the problem.

(Yeah, there is a problem, but leaking hashes is not the biggest one)

Jump in the discussion.

No email address required.

leaking /etc/shadow is just a proof of concept, they can probably leak anything on your pc. a good target could be the saved passwords in your browser

Jump in the discussion.

No email address required.

That's why I save all my password on post-its on the monitor. Way more safe.

Jump in the discussion.

No email address required.

This but unironically, getting into my house requires traversing multiple obstacles and hoping im not awake to shoot you

Reject password managers, embrace sticke

Jump in the discussion.

No email address required.

BIPOCstonguemyanusmarsey88

Jump in the discussion.

No email address required.

Unironically a great password. It's only missing some special characters.

Jump in the discussion.

No email address required.

:marseyswastika:

Jump in the discussion.

No email address required.

Can someone explain why I should panic over this

Jump in the discussion.

No email address required.

An infected program (maybe even Javascript on a website if attackers can get tricky enough) is able to see stuff in memory (passwords and stuff) that they're not supposed to using some stuff that's built in to the cpu. This can get around a lot of built in security stuff to prevent this normally.

It's a big deal because it could theoretically be disasterous. If understand it's also not huge deal because it's pretty hard to do and takes quite a bit of time.

You should panic because making others panic is dramapilled.

Jump in the discussion.

No email address required.

Is this the new covid variant

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.