![]() ![]() And you - or an antivirus program - wouldn’t necessarily know that someone is snooping on your data since Meltdown and Spectre are exploiting a normal function of your computer’s processor. Meltdown and Spectre exploit this feature by using malicious code that tricks a computer into speculatively loading information it wouldn’t normally have access to. ![]() Someone sorting through those trashed orders might gain brief unauthorized access to your name or your daily order. That’s the problem with speculative execution- all those junked orders, they’re not really protected. Those unused, pre-made orders… they get trashed. Your coffee is ready for you before you ask for it and you’re in and out of the shop faster than if you were to order from scratch every time. Imagine if your favorite coffee shop began preparing your favorite orders ahead of time. Speculative execution allows the computer to guess what you might do next and perform necessary calculations for those possible outcomes, keeping one step ahead of you. Processors are the chips inside a computer that allow it to perform hundreds of billions of calculations per second. To satisfy this insatiable need for increasingly fast computers, chip developers added a function to processors called Speculative Execution. ![]() The fastest, most responsive stylus experience ever has been built. The new Apple TV isn’t just slightly faster, it’s remarkably faster. And these flaws exist not because of a bug in computer software design, but because of a feature in computer hardware that has been around since 1995.Ĭonsumers expect computers to get faster and faster each year. What makes Meltdown and Spectre especially sinister, aside from their James Bondian names, is that they affect your computer at the hardware level: the processors inside your devices. Technology firms are currently rushing to fix these two security flaws identified in computer chips. If you store any personal information on a computer, smartphone, or web service, your data is at risk from two massive computer security exploits: Spectre and Meltdown. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |