>Last week we reported about Spectre-NG, eight new vulnerabilities similar to Spectre, of which four tagged as critical have been detected. Intel would have been working behind scenes on patching the new vulnerabilities, as it now seems it will take at least another two weeks before Intel can release the initial patches.
>pay premium >doesn't get premium what did he mean by this?
also, why buy 2600x when you can overclock 2600 just as well?
Liam Garcia
>premium
i paid $270 for that cpu last year
Aaron Perez
You MIGHT be able to. Silicon Lottery.
I bought a 1700 instead of a 1700x and put the extra money to better RAM.
My 1700 barely hits 3.85ghz on water cooling.
A 2600x is a better binned chip, so it's going to have higher tolerances, even if you get a bad one, it'll still be better than the average 2600.
Nicholas Hall
my 2600 is running fine at 4.15ghz
Ayden Lee
>intel delaying spectre/MELTDOWN patches again so that their processors don't get slowed down during Threadripper 2 benchmarks release day
fuckjing pathetic
brian should kjill hijmlelf
Alexander Long
I wonder how much performance intelaviv CPUs will lose this time. Intel single thread performance only better because they don't give a fuck about security absolutely confirmed now.
Mason Murphy
thread
Adam Diaz
This. The large performance impact patches are only enabled if you manually enable them. They're disabled by default.
how do you know spectre-ng doesn't affect AMD? the reports mention Intel in a way that makes me wonder if they talk about Intel, as in the company, or Intel, as in the x86 CPU architecture. the link in the OP says: >AMD has indicated it is investigating all reports. It is completely unclear whether the company was affected by the vulnerabilities as well. so it's not clear at all
Tyler Allen
I see your concern, but I think it's a little strange that they spent so much time researching these hardware flaws but they couldn't afford/didn't have time to at least test a Ryzen based computer system?
This happened with the OG Spectre and Meltdown vulnerabilities (lots of speculation from the researchers themselves that AMD maybe was affected by Meltdown (why didn't they test themselves ?????????????????????????????????????)
Connor Perry
>I see your concern, but I think it's a little strange that they spent so much time researching these hardware flaws but they couldn't afford/didn't have time to at least test a Ryzen based computer system? these are classes of exploits, it's not their job to check if a given CPU is vulnerable or not, it's the manufacturers job also, the fact that different architectures are so diff means they'd have to invest even more time...
William Foster
>intel security has more holes than siwss cheese
Jonathan Moore
>Intel >More Vulnerabilities than Cores!
Liam Long
At having more vulnerabilities than cores, you mean?