Pinboard (geetarista)
https://pinboard.in/u:geetarista/public/
recent bookmarks from geetaristaFOSDEM_2018.pdf2018-02-05T23:05:26+00:00
https://people.redhat.com/jcm/talks/FOSDEM_2018.pdf
geetaristasecurity meltdownhttps://pinboard.in/u:geetarista/b:6149486a3939/Some thoughts on Spectre and Meltdown2018-01-17T16:55:48+00:00
http://www.daemonology.net/blog/2018-01-17-some-thoughts-on-spectre-and-meltdown.html
geetaristameltdownhttps://pinboard.in/u:geetarista/b:d034339076a9/Meltdown | the morning paper2018-01-15T15:59:56+00:00
https://blog.acolyer.org/2018/01/15/meltdown/
geetaristameltdownhttps://pinboard.in/u:geetarista/b:0bb248c6e3bd/metablog: Meltdown patch reduces mkfile(8) throughput to less than 1/3 on macOS2018-01-14T21:26:23+00:00
http://blog.metaobject.com/2018/01/meltdown-patch-reduces-mkfile8.html
geetaristameltdown machttps://pinboard.in/u:geetarista/b:2e1fe36e41da/I read the Meltdown paper so you don't have to2018-01-12T16:48:12+00:00
https://razorpay.com/blog/meltdown-paper-summary/
geetaristaMeltdown is a cache-timing attack on Intel CPUs that allows all memory to be read by any process because of how they do Speculative Execution.]]>security meltdownhttps://pinboard.in/u:geetarista/b:4a9ed8fcd2fe/Ask HN: Why CPU manufacturers did not foresee Meltdown? | Hacker News2018-01-10T04:09:13+00:00
https://news.ycombinator.com/item?id=16109076
geetaristameltdownhttps://pinboard.in/u:geetarista/b:4e516f6753fa/GitHub - IAIK/meltdown: This repository contains several applications, demonstrating the Meltdown bug.2018-01-09T19:53:25+00:00
https://github.com/IAIK/meltdown/
geetaristameltdown - This repository contains several applications, demonstrating the Meltdown bug.]]>meltdownhttps://pinboard.in/u:geetarista/b:459f5b814390/Spectre & Meltdown: tapping into the CPU's subconscious thoughts • ds9a.nl articles2018-01-09T02:28:45+00:00
https://ds9a.nl/articles/posts/spectre-meltdown/
geetaristaComments are very welcome on bert.hubert@powerdns.com or @PowerDNS_Bert. Update: several constructive remarks have been used to improve this text. Thanks!
In this post I will attempt to fully explain the Spectre and Meltdown vulnerabilities in an accessible way. I decided to write it up after I realised it took me more than a day to figure it out, even though I’ve been doing security related stuff on CPUs for 20 years.]]>security cpu meltdown processorshttps://pinboard.in/u:geetarista/b:28df06eae77c/Genius explanation of Meltdown/Spectre malware : sysadmin2018-01-09T02:28:36+00:00
https://www.reddit.com/r/sysadmin/comments/7ot0ke/genius_explanation_of_meltdownspectre_malware/?st=jc5r626l&sh=32df98ea
geetaristabert.hubert@powerdns.com creates a simple explanation of how Meltdown and Spectre gain access to data thru CPU...]]>meltdownhttps://pinboard.in/u:geetarista/b:3db13c333731/What Spectre and Meltdown Mean For WebKit | WebKit2018-01-09T02:22:20+00:00
https://webkit.org/blog/8048/what-spectre-and-meltdown-mean-for-webkit/
geetaristameltdown security webkithttps://pinboard.in/u:geetarista/b:129ed46e8cc4/Why Raspberry Pi isn't vulnerable to Spectre or Meltdown - Raspberry Pi2018-01-06T00:44:25+00:00
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
geetaristaEben gives you a crash course in how modern processors work to explain why Raspberry Pi is unaffected by the Spectre and Meltdown security vulnerabilities.]]>cpu raspberrypi meltdown securityhttps://pinboard.in/u:geetarista/b:48f0c7c79920/meltdown_redis.md2018-01-06T00:43:38+00:00
https://gist.github.com/antirez/9e716670f76133ec81cb24036f86ee95
geetaristameltdown redishttps://pinboard.in/u:geetarista/b:30754e424869/Meltdown & Spectre Megathread : sysadmin2018-01-06T00:24:46+00:00
https://www.reddit.com/r/sysadmin/comments/7o39et/meltdown_spectre_megathread/?st=jc1fy18q&sh=7f28056b
geetaristaDue to the magnitude of this patch, we're putting together a megathread on the subject. Please direct your questions, answers, and other comments...]]>meltdownhttps://pinboard.in/u:geetarista/b:0e82392b8a90/