• narc0tic_bird@lemm.ee
    link
    fedilink
    English
    arrow-up
    56
    ·
    10 days ago

    Speculative execution seems to be the source of a lot of security flaws in many different CPUs. CPU manufacturers seem to be so focused on winning the performance race that security aware architecture design takes the backseat.

    Also, it’s more and more clear that it’s a bad idea that websites can just execute arbitrary code. The JS APIs are way too powerful and complex nowadays. Maybe websites and apps should’ve stayed separate concepts instead of merging into “web apps”.

    I also wonder if it’d be possible to design a CPU so vulnerabilities like these are fixable instead of just “mitigable”. Similar to how you can reprogram an FPGA. I have no clue how chip design works though, but please feel free to reply if you know more about this.

    • Unmapped@lemmy.ml
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      edit-2
      9 days ago

      Being a Linux user I really like everything being ran in the browser. What if we just have more control of which JS APIs can be used? On a site by site bases. Which I assume can probably already be done with extensions.

    • grue@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      9 days ago

      Also, it’s more and more clear that it’s a bad idea that websites can just execute arbitrary code. The JS APIs are way too powerful and complex nowadays.

      Javascript in general was a mistake, and always has been.

      The web should’ve had Scheme or Python instead. Or better yet, we shouldn’t have given up so quickly on Java Web Start because then we could’ve had proper web applications with their own windows and native UIs and such.

      Maybe websites and apps should’ve stayed separate concepts instead of merging into “web apps”.

      Damn straight!

  • Thistlewick@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    19
    ·
    10 days ago

    FYI

    “ They also said they don’t know if browsers such as Firefox are affected because they weren’t tested in the research.”

    Seems you should be fine if you follow the usual protocols though: don’t open suspicious links, check urls, that sort of thing. I expect a frantic phone call from my mother-in-law who has an iPhone 8 any minute now…

  • JaddedFauceet@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    9 days ago

    FLOP abuses the LVP in a way that allows the attacker to run functions with the wrong argument—for instance, a memory pointer rather than an integer.

    is this a vulnerability in the software? So patching this won’t require disabling speculative execution?

  • extremeboredom@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    26
    ·
    10 days ago

    But-but I was told Apple’s security was the very best! That’s why they charge so much for everything they make, right? … Right?