- cross-posted to:
- hackernews
- cross-posted to:
- hackernews
On Tuesday, an international team of researchers unveiled BadRAM, a proof-of-concept attack that completely undermines security assurances that chipmaker AMD makes to users of one of its most expensive and well-fortified microprocessor product lines. Starting with the AMD Epyc 7003 processor, a feature known as SEV-SNP—short for Secure Encrypted Virtualization and Secure Nested Paging—has provided the cryptographic means for certifying that a VM hasn’t been compromised by any sort of backdoor installed by someone with access to the physical machine running it.
Kinda annoyed with Ars for perpetuating this trend of dramatized security vulnerability names and descriptions.
Ars went the way of Toms a while ago for me. There’s some decent stuff to be found but most of it is click/rage bait.
I still think it’s generally more good than bad and I appreciate they provide an authenticated ad free RSS feed for subscribers, but I think this was one of their worst headlines.