How can the average home user avoid being raped by someone exploiting the Intel vulnerabilities?

How can the average home user avoid being raped by someone exploiting the Intel vulnerabilities?

Hard mode: No "buy AMD" answers

Attached: 1551785196923.png (600x600, 172K)

Other urls found in this thread:

theregister.co.uk/2019/03/05/spoiler_intel_processor_flaw/
grc.com/inspectre.htm
twitter.com/NSFWRedditVideo

Unplug the ethernet cable.

Use an airgapped workstation for all sensitive data.

I'm pretty sure the updates are mostly able to be fixed in software. If you're on the latest version of an OS that gets updates (not Windows 7 as of next year), then you are likely not going to suffer. At some point there could potentially be an exploit that can't be fixed on the OS level, in which case maybe you'll have to use AMD (they could be subject too, though), or failing that invest in an ARM desktop processor like what IBM offers (which is theoretically a very good option).

Buy IBM power9

Buy ARM

Buy ARM

buy POWER9

Is this the new meme?

Buy ARM

buy AMD faggot

Fuck you goy stop with these antisemitic threads.

Attached: 1527629778452.jpg (679x758, 54K)

kek

Intlel BTFO

WAIT FOR INTEL METEOR LAKE IN 2022.

Buy RISC-V

Buy MIPS

Just get a good firewall and don't run rogue programs.
But that sadly include not letting javascript run by default.

Disable SMT

Update security patches on things and most problems will be avoided. The real targets for these exploits are more towards other platforms non end user

Aren't the microcode updates only offered on Windows 10?

Mac OS and GNU/Linux have patches available for Spectre and Meltdown, since a lot of Intel's server market probably is not on Windows. There should likely be universal support for patches as long as your OS is supported.

If you’re talking the home user then you don’t have to do much
Keep your OS updated
Run the latest BIOS
Keep your browser updated
Don’t run shady shit or visit shady websites and use an Adblocker
Unless you’re a target for someone there is nothing drastic you need to do

If you are affected by this chances are 99% sure that you're a fucking moron who has worse shit running on the system by that point. You need to run an execute code on an admin level for shit which if you're doing and running remote code like that fucking lol you probably have free dolphin wallpaper.exe and shit installed so your info is been hijacked multiple times already.

Purchase a CPU from their competition.

>If you are affected by this chances are 99% sure that you're a fucking moron who has worse shit running on the system by that point. You need to run an execute code on an admin level for shit
Imagine being this much of a brainlet lmfao. You don't need to run shit. All it takes is some javascript on a website, and it doesn't matter if you are using a non-admin account, or if the code is running on a virtual machine.

Honest answer: you can't. Because half the time the CPU update comes through the BIOS but motherboard manufacturers are never forced to send them out in a timely and orderly fashion. You could update to the latest BIOS version and still have multiple security vulnerabilities unpatched. Older intel hardware like that of haswell/sandy bridge are particular prone to this problem since BIOS updates usually stop altogether.

The only other alternative I can give is to completely disable and outgoing/incoming internet connection to your intel computer and do any internet related activities on your phone/tablet.

Attached: cokedupkoreanspeech.png (1828x1740, 999K)

This, the point of the vulnerabilities is they escalate to privileged modes not available to them without user intervention. All it really takes is for the user to load a webpage with a malicious ad, they don't have to click on it or anything.

You work in desktop support, don't you

M8, you can literally pull data straight from the RAM on users WITHOUT admin accounts just by having them visit a website with a malicious ad.

You know how hard it would be to pull actually useful data?
Spectre is really easy to demonstrate with canned demos but actually making some js script to pull something out of memory like a password which can be anywhere in memory is another story

This

also vulnerable to SPECTRE, which you would know if you bothered to search engine it
the IBM offering you are referring to is POWER, not ARM.

>on your phone/tablet
nope since many are also vulnerable to SPECTRE

>free dolphin wallpaper.exe
hook me up with that shit, dawg

You've no way of knowing, numb nuts. people always point to the OP, and im new to me.

By continuing to be the average home user. No one is burning these sort of attacks on the general populous.

>actually making some js script to pull something out of memory like a password which can be anywhere in memory is another story
Hello, meet my friend mimikatz..

Youre not likely to encounter anything like that if youre not retarded

SPARC with Solaris.

FUCKING METEOR LAKE LMOA

>Not modding your BIOS

>Older intel hardware like that of haswell/sandy bridge are particular prone to this problem since BIOS updates usually stop altogether.
Literally a non-problem. Using UBU on AMI UEFI is as simple as choosing a few options.

Install linux, some LTS version

>You know how hard it would be to pull actually useful data?
Not hard at all. Welcome to spoiler: theregister.co.uk/2019/03/05/spoiler_intel_processor_flaw/

This is it.

the internet was a mistake.

How do you upgrade BIOS on an old laptop?

There is no solution. AMD is just as insecure. No OS and no software can help you. ARM is even worse. Just be smart and if you really need to, maintain an airgapped computer. That's not totally safe but its probably overkill unless some government is after you.

>no js
>sadly

5 shekels have been deposited to your account

Architectures are too complex to maintain security these days. Your hardware security measures are little more than placebo and caution tape to keep out script kiddies.

grc.com/inspectre.htm
Just update microcode and OS. There's some performance hit for both Intel and AMD on Windows right now, but with the next W10 update it should be pretty much gone AFAIK.

Yes, trust this go- I mean boy

>No "buy AMD" answers
I dont give a fuck, FX cpus don't deal with this vulnerability bullshit like these hyperthreaded ryzen and Intel chips.

Attached: BD495i_1.png (700x600, 87K)

Ok shill

Seething kike, go bribe and lie some more.

Literally doesn't matter,
The first line of protection will be a updated OS, and common sense
If you don't have that you'll get fucked regardless of vulnerabilities

>How can one avoid begin raped by someone during the night in a dark alley deep within the ghetto?
>Hard mode: No "do not walk in there naked" answers

>Hard mode: No "buy AMD" answers
Not wanting to hear the only real answer is not hard mode, that's retard mode.
The recent vulnerabilities are on the hardware level and CAN'T be fixed with any software, a complete redesign of the chip is needed for that. So the literal only answer is buy an AMD processor.

Unplug wifi

>Not wanting to hear the only real answer is not hard mode, that's retard mode.
Not everyone has money to buy a new processor. That's the point of OP's phrase.

Unplug power

Well that makes much more sense not gonna lie. Still though if you have an actual critical application no way around buying either ARM or a newer AMD chip if remote code execution is part of your risk assessment.

Just infect your PC with agy porn everywhere. Every file in your system is just two Jow Forums bros fucking hardcore, every website you visit is gay porn, rename all your files to gay porn. So that when hackers get your data, they'll get nothing but gay porn.