Oh wow. Why did anyone think of that before? You've solved computer security!They are mostly single-user anyway. Just don’t download and then execute a virus.
True but MI6 have been fighting them since at least 1961.Dan Goodin said:Spectre, you may recall, first came to public notice in 2018.
When I was younger, GPUs were strictly for powering entertainment experiences and similar applications. ._.Dan Goodin said:That likely means that people using games and similar apps will see no benefit.
This "obscure stuff" was highly important for Cloud PRoviders (like amazon, Microsoft, Google, IBM, Oracle, Vodafone, Telefonica, OVH, et al), as anyone was allowed to buy a VM, have said VM run the Spectre code and exfiltrate data from other SERVER VMs.Seems like common sense to me - why waste effort on a finicky timing attack when there are so many easier ways to own most machines, especially in the age of ill-understood chatbots? Fix those first, then worry about this obscure stuff.
So one re-enables the mitigations by setting the 'disable mitigations' flag to false? Is that kind of double negation common in naming things like build flags?Ubuntu users who run a custom Linux kernel without Spectre GPU mitigations should keep the compute runtime level mitigations on, a spokesman for Ubuntu developer Canonical said. These users can build a Compute Runtime themselves with theNEO_DISABLE_MITIGATIONS=falseflag added.
There are lots of POCs available.Has there been a known POC of an exploit that could install a backdoor or ransomware on a computer or server with Spectre yet?
“The economics just don't stack up for attackers, especially when there are so many lower-effort higher-reward attack approaches they can throw at stuff.”
A lot of build systems default flags to 0/false if not explicitly defined.So one re-enables the mitigations by setting the 'disable mitigations' flag to false? Is that kind of double negation common in naming things like build flags?
// ... Stuff ...
#if !NEO_DISABLE_MITIGATIONS // ! means invert the value, so false becomes true
mitigateSpectre();
#endif
// ... Stuff ...
If the default is a flag being "on" or "enabled" you would just drop the option line that turns them off. Easy peasy.So one re-enables the mitigations by setting the 'disable mitigations' flag to false? Is that kind of double negation common in naming things like build flags?
There are ways with registry keys to disable some of the mitigations yes. But, despite what you see Ubuntu doing, don't do this unless you absolutely know what you're doing! If you have to ask, you don't know what you're doing.Can these protections be disabled in Windows, if so desired?
It's a shame to see (currently) your post upvoted so heavily and the one you responded downvoted. That's literally the solution in this case, and what the article points out and what the Ubuntu decided was the solution. The poster was very specific in saying that this is an appropriate response to this particular problem in single-user systems. They know it's not applicable to every platform and never claimed it was the one single solution.Oh wow. Why did anyone think of that before? You've solved computer security!
Developers are a quirky bunch.So one re-enables the mitigations by setting the 'disable mitigations' flag to false? Is that kind of double negation common in naming things like build flags?
Replace "Spectre" with "Y2K" in your statement and tell me if you still agree with what you said.Oh finally, people are starting to act rationally. Spectre has been overblown by the tech media from the start. People hear about "unfixable flaw in the CPU!" and panic without realizing just how many practical challenges there are to pulling off a successful exploit using Spectre. It's always been mostly a lab curiosity with almost zero potential impact for typical home usage.
There have been plenty of PoCs including browser-based attacks with Javascript so it's well beyond "theoretical issue"Oh finally, people are starting to act rationally. Spectre has been overblown by the tech media from the start. People hear about "unfixable flaw in the CPU!" and panic without realizing just how many practical challenges there are to pulling off a successful exploit using Spectre. It's always been mostly a lab curiosity with almost zero potential impact for typical home usage.
HTML standardized some Meltdown/Spectre mitigations (Mozilla Standard Security Requirements).Just remember that JavaScript programs are still programs!
.... Just don’t download and then execute a virus.
My view is that the default, expected (and most often safe) value should be 0. So if a value isnt set, the default, expected and safe behaviour happens. So, you would need to actively change the default behaviour for it to take effect; either disable a security feature, enable some extra experimental feature etc.So one re-enables the mitigations by setting the 'disable mitigations' flag to false? Is that kind of double negation common in naming things like build flags?
I'm pretty sure this is wrong. GPUs don't do branch prediction or speculative execution. Being massively parallel means they can happily stall a thread for dozens or hundreds of cycles while resolving branches and memory accesses, since they can find plenty of other threads to keep the execution units busy in the meantime. Speculative execution is needed on CPUs because each core runs only a single thread (or maybe two), and they have to do lots of fancy tricks to extract a modest amount of parallelism from it and minimise the impact of stalls.Ultimately, cryptography engineer Sophie Schmieg said, the benefit of the mitigations isn't worth the performance costs to GPU performance, where predicting instruction branches is more critical than for CPU performance.
“The system can effectively parallelize a lot more actions without requiring expensive synchronization points between the cores,” Schmieg said. “If anything, something massively parallel like a GPU wants to do branch prediction even more liberally than a CPU.”
I think people are just responding negatively to the smug “don’t download and execute a virus” thing, which is like, eh, fair game, it is a bit smug. But, also, it has always been the obvious and only real solution (for regular users who don’t need to act as a host).It's a shame to see (currently) your post upvoted so heavily and the one you responded downvoted. That's literally the solution in this case, and what the article points out and what the Ubuntu decided was the solution. The poster was very specific in saying that this is an appropriate response to this particular problem in single-user systems. They know it's not applicable to every platform and never claimed it was the one single solution.
But if you'd rather sink 20% of your gpu performance into risks that aren't a reality for your system, go for it I guess.
(Though note the caveats that A_Very_Tired_Geek posted above.)
Every system is multi-user unless you're running it as root.It's a shame to see (currently) your post upvoted so heavily and the one you responded downvoted. That's literally the solution in this case, and what the article points out and what the Ubuntu decided was the solution. The poster was very specific in saying that this is an appropriate response to this particular problem in single-user systems. They know it's not applicable to every platform and never claimed it was the one single solution.
But if you'd rather sink 20% of your gpu performance into risks that aren't a reality for your system, go for it I guess.
(Though note the caveats that A_Very_Tired_Geek posted above.)
I think you meant to say they’re not an unquirky bunch.Developers are a quirky bunch.
This is why context is so important. The "user" we're talking about here is a human being. Not every system has multiple users. Most personal systems don't, in fact.Every system is multi-user unless you're running it as root.
LOL. That's funny. And this kind of attack is like being "all shook up" about a risk that is somewhere around the inverse of 8 x 9's... Something to pontificate about no more, no less.True but MI6 have been fighting them since at least 1961.