Intel breathes a sigh of relief as the spotlight moves off of them for a beat.

  • SupraMario@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    5 months ago

    That’s not how this exploit works at all…you have to have physical access to the machine basically. This is a nothing burger.

      • SupraMario@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        4
        ·
        5 months ago

        It’s not going to be there because if you’re compromised via physical access, no one is going to give a shit about this exploit… it’s like someone having the keys to your house and then being worried they’re going to smash out a window to gain access.

        • db2@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 months ago

          I don’t think you’re following along here. The physical access would have already happened prior to the CPU even being in my possession.

          • SupraMario@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            5 months ago

            I see what you’re saying. You’re assuming someone grabbed a bunch of cpus, fucked with them, then tossed them back into the box and sold them as new.

            • db2@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 months ago

              Exactly, if I were a bad actor with access to the stock that’s what I’d do. I’m sure there are multiple points along the supply chain where it could potentially happen.

              • SupraMario@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                5 months ago

                That’s true, seems like you’d need to know where they’re going though, like a ton of work just to hopefully get one machine infected that has anything on it.