30 pointsby Fnoord11 hours ago1 comment
  • thijsr5 hours ago
    Hi, author here. Thanks for posting this! I gave a talk yesterday at the 39th Chaos Communication Congress in Hamburg that goes into detail about how the vulnerability works [1]. Short summary, on affected CPUs, all of host physical memory can be read, despite commonly applied software mitigations. On Google Cloud, we were able to leak from all of the physical memory from other tenants as well, without having to interact with the victim virtual machine.

    [1] https://media.ccc.de/v/39c3-spectre-in-the-real-world-leakin...