CTS Labs is fake ne-

AMD ships CTS Labs vulnerability patches to ecosystem partners
overclock3d.net/news/cpu_mainboard/amd_ships_cts_labs_vulnerability_patches_to_ecosystem_partners/1

Attached: AMD_Ryzenfall.png (811x744, 199K)

Other urls found in this thread:

youtube.com/watch?v=GNPcxXZ2ki8
cvedetails.com/vulnerability-list/vendor_id-7043/AMD.html
twitter.com/NSFWRedditGif

>somebody actually got paid to do logos and names for CPU vulnerabilities

>He thinks that jews paid something for this
they probably hired some inlel fanboy and he did this for free

Yes its fake, because they say about it like its catastrophic vulnerability, but in reallity its not even close.

they're just sending .txt files containing a single LOL each

You fucking ignorant.
They did say it's amd's fault, but in tge documents and the whitepaper they say that the vulnerability is on the code of some peripheral, e.g. ASMedia, they didn't prove at all that amd's cpu had a sec. flaw.
All amd did was possible update f/w and μcode to invalidate the ASMedia keys which they gave to asmedia and those are leaked, and created new ones.

We know they are real but you need hardware access to use them.
They were kind of no shit issues.
Also it is probable that they might give us coreboot/libreboot support.

We've known CTS Labs has been an Intel defamation program for a while now. There is literally nothing of substance that CTS Labs/Intel has put out in their 'report' to lower AMD stock value.

It's been categorically destroyed here:
youtube.com/watch?v=GNPcxXZ2ki8

>AMD rushing out patches
>"nothing"
And I bet you don't even hold any AMD stock. You're shilling for free.

My comment wasn't about patches. Both Intel and AMD have rushed patches and microcode updates due to recent vulnerability scandals.

My comment was about the validity of CTS labs and it's fake 'report'.

cvedetails.com/vulnerability-list/vendor_id-7043/AMD.html

Look at the CVE rating.

Jow Forums BTFO'd again.

>hey mr partner, here's the patch to the cts labs
>bigimportantpatches.zip
>unzips it
>vulnerabilitypatchguide.txt
>"don't give people physical access admin rights to your hardware lol"

>confirming that all attack types required administrative access to exploit
If the attacker has admin rights, you're already fucked.

Doesn't change the fact that the danger score is 9.3 brainlet. Also, your argument is tantamount to 'oh intel CPUs have backdoors anyway so you are screwed regardless'. You are simply grasping on straws and in denial.

Lol.

>oh intel CPUs have backdoors anyway so you are screwed regardless
Well, how is that wrong? If you want a security you don't buy Intel. Everybody knows that.

>Doesn't change the fact that the danger score is 9.3 brainlet.
I could walk into your house and steal your computer. Does that mean your hardware is to blame? Trying to make a CVE out of something so common sense is a bit stupid, user. Did you know your keyboard is vulnerable to hammers? OMG! Your OS must suck!

>Trying to argue against well established CVE numbers
The absolute state of Jow Forums

All of them require admin access who cares, get a life

>the attack gives you privilege escalation but requires you to already have admin access
really makes you think

amd clearly stated that it was all on asmedia side to deliver

AMD DELIVERED FIXES

>Those 9.3s
>Gained access: None.
That's really moronic.

Is anybody going to use these exploits to disable the PSP?

NO SHUT UP GOY AND BUY INTEL

>The Vulnerabilities were publicly disclosed without giving AMD a heads up to have a fix ready
Gee, I really wonder who could possibly benefit from doing something like this, against standard procedure? Who could possibly benefit from attempting to put a boulder on Ryzen's path?

Guess we'll never know.

kek

do YOU know what CVEs mean? in some cases, the CVEs have to be modified by the vendors, because otherwise they don't mean shit.

this, or even better, to install coreboot...

Attached: 2018-05-06 17_24_56-Intel _ Security vulnerabilities.png (1249x78, 11K)

Do you have any other argument besides pointing to this one meta metric and saying "the number is big!".

wew, it doesn't look that bad when you start comparing it with other companies

Attached: Untitled-5.jpg (330x229, 28K)

>taking an undefined and inconsistent rating made up by a bunch of masturbating monkeys as a meaningful metric

Attached: Disgusting.jpg (480x451, 41K)

>hey goy, I found a vulnerability on Ford manufactured cars
>if you give your keys to someone, they might even be able to steal your vehicle!
>and if you leave it unattended in a bad neighborhood it is also at risk of bad things happening to it!
>go buy Chevrolet instead
>we may or may not have Chevrolet stocks and a sizable amount of money ready to buy Ford stocks if and when they drop

Attached: 0b3.png (233x261, 84K)

It's more like if you give your keys to someone they can hijack your car at any time after that even if you think you got the keys back.

If you have a key irl you can get a copy made in like 10 minutes at any hardware store so the analogy still holds up fine.