- cross-posted to:
- security
- cross-posted to:
- security
On Tuesday, an international team of researchers unveiled BadRAM, a proof-of-concept attack that completely undermines security assurances that chipmaker AMD makes to users of one of its most expensive and well-fortified microprocessor product lines. Starting with the AMD Epyc 7003 processor, a feature known as SEV-SNP—short for Secure Encrypted Virtualization and Secure Nested Paging—has provided the cryptographic means for certifying that a VM hasn’t been compromised by any sort of backdoor installed by someone with access to the physical machine running it.
My favorite computer vulnerability is when a state actor kidnaps me and attaches high voltage jumpers to my ballsack with the threat of frying them if I don’t give up my NFT seed phrase.
My second favorite vulnerability is when a common robber steals my Daddy Tate Tokens from my shadow encrypted, quantum hardened disk by breaking my kneecaps with a $5 wrench.
There’s no need to bring your OnlyFans subscriptions into this discussion. You do you.
There’s an XKCD reference in there, I’m sure of it
XKCD #538: Security