2019

>2019
>still not protected against Spectre
ISHYGDDT

Attached: SPectre.jpg (462x358, 52K)

Other urls found in this thread:

bleepingcomputer.com/news/security/the-intel-microcode-boot-loader-protects-older-cpus-from-spectre/
majorgeeks.com/content/page/protect_older_motherboards_from_vulnerabilities_like_spectre_with_intel_microcode_boot_loader.html
twitter.com/NSFWRedditGif

Why bother with security? There are billions of vulnerabilities that you will ever know about.

Pentium4life

Attached: frjjo.png (465x354, 20K)

Fuck off, officer. Go glow in the dark somewhere else.

>buying intel

There are no AMD NUCs/small form factor computers
>tfw had to buy a chinkbox

Attached: 1533232899383.jpg (599x495, 99K)

>Spectre
Never heard of it, sounds like something SEETHING AMDfags would make up

kek

Attached: InSpectre_2019-01-02_12-30-41.png (464x359, 36K)

>small form factor computers
throttling meme

>unironically believing to be protected against spectre when a hundred more vulnerabilities based on it are discovered every month

I just wanted a low power machine to run some basic home server tasks and the one I got was cheaper than armbian sbcs

Only if you're an Intel cuck.

Attached: Screenshot_20190102_072231.png (1177x1715, 1.48M)

9700k, so it has in-silicon fixes in place for metldown.

Attached: 2019-01-02 08_27_21.png (446x324, 17K)

.ru me

Attached: Untitled-1.png (464x359, 19K)

"performance: good"

"performance: slower"

yeah real quantitative...

it's not a quantitative test, it's literally a quick check. If you want real analysis it's going to take work, and you should be using workloads that are relevant to your use-case, as anything else would just be guessing how much it will impact YOU.

Only YOU know what you'll be doing with the CPU, anyone claiming performance is better or worse would need to know exactly what you plan to do, anything else is just a guess.

I could've sworn i had this utter nonsense disabled. I'll fix that in six hours when I can reboot.

Attached: Untitled.png (464x359, 17K)

I disabled Meltdown protection and ran some benchmarks, got the same results so I might as well leave it running.

>what the hells meltdown amd spectre again?...
>oh yeah, fucked up cpus. which range is it again?...
>shit mines on the list. never looked properly into this did i...
>whats the link to that freeware...
>here goes nothing - open InSpectre.exe...

Attached: Untitled.png (465x360, 17K)

Protect Older Motherboards from Vulnerabilities like Spectre with Intel Microcode Boot Loader

bleepingcomputer.com/news/security/the-intel-microcode-boot-loader-protects-older-cpus-from-spectre/

majorgeeks.com/content/page/protect_older_motherboards_from_vulnerabilities_like_spectre_with_intel_microcode_boot_loader.html

what about arm?

Spectre is a memory timing side-channel attack. It will work against all hardware unless the hardware basically salts paging with random time delays; the only thing currently stopping it is the effort of testing to configure the timing for any specific hardware.

See It was cheaper than an SBC of equivalent hardware
Plus it boots windows 10 so I can rip off some normie on CL at a markup after I get tired of it

>the only thing currently stopping it
I mean, also the fact it requires physical access to the machine...

For a home user it's pointless, for cloud service providers and similar VPS providers, it is a real concern. But for a home user? Pointless to even consider it.

You need either physical access to the hardware, or access to the server already through a VM or similar.

Not a concern for 99% of users.

based+ludditepilled

RYZEN 1600 MASTER RICE

Attached: Captur1e.jpg (504x398, 47K)

ITT, lots of people which were not able to mod their bios themselves

Attached: Untitled.png (478x371, 17K)

I have 'performance: good' with a microcode update. Didn't flash BIOS.

Some older processors will inevitably suffer a performance impact, and a BIOS update won't fix it.

Although Microsoft will be putting in Retpoline in early this year as a variant 2 mitigation which should improve performance.

t. equifax CIO

why not an itx build then

I wanted something quiet with no moving parts

Ataribox

does chrome has built in patches to mitigate this?

Yes
It's a security feature called Site Isolation and has it since Chrome 63

>wants to be protected against spectre
>not even protected against microsoft

> upgrade microcode
> get slower performance
> for a feature that only be accessed via JTAG+USB.
that'll be a no from me.

There we go. It's fixed now.

Attached: Untitled.png (464x359, 17K)

6700k+Wangblows 10

Attached: nothing.png (464x361, 19K)

Windows still can't load microcode updates at boot?

Attached: 1542509690481.png (478x368, 50K)

t. 8750h

Attached: 0.png (464x359, 20K)

Nice try,Mossad.

>year 2018+1
>still using Windblows
ISHYGDDT

damn it

Attached: upgrade urgent.png (464x359, 19K)

So I'm safe from CIA glow in the dark niggers?

Attached: Screenshot from 2019-01-03 01-12-50.png (1129x529, 119K)

Guess we'll never find out.

Attached: ri.png (1680x1050, 844K)