Follow

""Future CPU designers should take care to consider this attack when building the secure systems of tomorrow. Developers should take care to not solely rely on pointer authentication to protect their software.""

Β· Β· 3 Β· 4 Β· 12

well, that's odd. The AppleInsider article states that the attack requires physical access, but the pacmanattack.com website clearly says they did all their experiments over the network.

Can I tell if someone is using PACMAN against me?

probably not.

@stman I can't really see how the industry will escape this pit they've dug for themselves. After all, they've known about this class of microarchitectural flaws since 1995!

Sign in to participate in the conversation
hackers.town

A bunch of technomancers in the fediverse. This arcology is for all who wash up upon it's digital shore.