Indeed. You can tell if it’s straight out of Googong Dam also.
Indeed. You can tell if it’s straight out of Googong Dam also.
My dog sees my girlfriend and I and then after, she wants a piece of my leg. It’s kinda cute, but disturbing at the same time. She knows what she’s doing. Parrots yeah I’m not surprised either.
IRLRosie is a good one too
Seems very similar to Zenbleed in terms of using certain register optimisation and speculative execution to get crippling security exploits. Thus far I haven’t read too much into the detail of the attack but This article on Zenbleed, written by the attack’s author, describes how the attack in detail and how he came to find it using fuzzing techniques - in this case two sets of instructions that should have had the same result, but they didn’t.
The write-up for this one is presumably this one.
Here is a good write-up of Zenbleed for the Ryzen 2 and up vulnerability. It uses similar register optimisation and speculative execution to get the same effect.
Tow it outside the environment.