Šta je novo?

Intelovi procesori imaju sigurnosni propust

Pa jel neko uspeo u praksi da hakuje neki sistem preko procesora ? :d
Drugo, kakve veze ima JS ili TCP/IP sa ovim ? Objasnjenje nema veze sa mozgom.
 
Pa valjda omogucuje da se cita tok podataka koji nije enkriptovan. Mozda tu i ima neke istine, ali ovo sto je napisano mi vise lici na prazno novinarsko trabunjanje, gde pisac niti zna o cemu prica, niti zna sta hoce da napise. Slicno kao sto je novinar Tanjuga pompezno najavio prezentaciju Nehalema u Srbiji. :d
 
Verovatno ima malo istine, tj da postoji nesto sto se pod nekim specijalnim okolnostima da zloupotrebiti, a novinari naprave slona od toga, kao da je to ono kliknes na dugme i tamo neki racunar uhakujes :)

Moglo su da napisu i o teoriji zavere, kako je to u stvari ostavljeno radi CIA ili sl :)
 
Poslednja izmena:
The heart-stopping thing about this particular exploit is that it hides itself in the SMM space. To put that into perspective, SMM is more privileged than a hypervisor is and it's not controllable by any Operating System. By design, the operating system cannot override or disable System Management Interupt (SMI) calls. In practice, the only way for you to know what is running in SMM space is to physically disassemble the firmware of your computer. So, given that an SMI takes precedence over any OS call, the OS cannot control or read SMM, and the only way to read SMM is to disassemble the system makes an SMM rootkit incredibly stealthy!
http://www.networkworld.com/community/node/39825?hpg1=bn

A ovi su valjda napravili exploit
http://theinvisiblethings.blogspot.com/2009/02/attacking-intel-txt-paper-and-slides.html
 
Vrh Dno