• 28 Posts
  • 2.19K Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle
  • Immediately and constantly apply updates.

    Very, very, rarely have I ever had to roll anything back. Newpipe I rolled back once.

    — After some thinking

    • MacOS - Minor changes Number.minor I update ASAP, Major Changes Number+1.1… I wait until Number+1.3… Apple has a history of breaking the ecosystem on major changes, give them a month or two to sort it out













  • I wish it were that easy, there’s a lot of shared architecture in CPU design. So maybe there’s cache lines that are shared, those have to be disabled.

    Architecturally, maybe memory tagging for cash lines that in addition to looking at the TLB and physical addresses also looks at memory spaces. So if you’re addressing something that’s in the cache Even for another complete processor, you have to take the full hit going out to main memory.

    But even then it’s not perfect, because if you’re invalidating the cache of another core there is going to be some memory penalty, probably infotesimal compared to going to main memory, but it might be measurable. I’m almost certain it would be measurable. So still a side channel attack

    One mitigation that does come to mind, is running each program in a virtual machine, that way it’s guaranteed to have completely different physical address space. This is really heavy-handed, and I have seen some papers about the side channel attacks getting leaked information from co guest VMs in AWS. But it certainly reduces the risk surface