Hacker News new | past | comments | ask | show | jobs | submit login

These academic PoCs read data that they themselves have staged during execution. This is very different from reading arbitrary, random memory that contains something like a cookie for another web site, password, or SSH key. When someone is looking for a real world exploit, this is what they want.



I don't think anyone has actually bothered to a microarchitectural side channel in practice yet.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: