![]() ![]() Impacted is the isolation of different users on a machine. AMD has now acknowledged their vulnerability after first denying it ( link). This hits practically anything modern, with a few exceptions ( Raspberry Pi models, Apple watch).Īlso the vendor information has to be treated with care, e.g. Meltdown and Spectre attack vulnerabilities in mechanisms which enhance the performance of the vulnerable processors. IMHO we need to wait for new processor generations. What really needs to be done are microcode updates Regarding ARM, Apple patched iOS in December and said they did not notice a measurable impact in performance across multiple benchmarks.As far as I understood, the Windows patches are just workarounds and It is advisable for companies to benchmark their own applications to see if performance is affected much and decide if something needs to be done about it.ĪMD said only Variant 1 of the vulnerability can affect their processors with minimal performance impact. Results vary much based on the benchmark, the processor and the mitigation used.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |