• AmbiguousProps@lemmy.today
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    3
    ·
    3 months ago

    It should be noted that if a hacker is able to exploit this, they’d need a lot of access and you’d already be boned. This is no where as bad as what Intel is going through right now.

    Saying that you have to “basically throw away your computer” is very misleading to say especially in a subtitle, when that exact thing is actually what is happening with Intel CPUs.

    • Lucy :3@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 months ago

      They say it’s “Platform secure boot” by AMD. They refuse to elaborate further though, and no one knows wth that is. Except AMD themselves ofc: https://www.amd.com/en/products/processors/technologies/pro-technologies.html

      Platform secure boot is designed to provide protection in response to growing firmware-level remote attacks being seen across the industry. AMD Secure Boot helps continue the chain of trust from the system BIOS to the OS Bootloader.

      Ah fuck it, here’s the security researchers explanation: https://labs.ioactive.com/2024/02/exploring-amd-platform-secure-boot.html?m=1

    • tomalley8342@lemmy.world
      link
      fedilink
      arrow-up
      3
      arrow-down
      3
      ·
      edit-2
      3 months ago

      It’s an exploit path to a UEFI bootkit, so at the very least you’d have to throw your motherboard away or find someone that can physically overwrite it through an external flash programmer or something. And the patch should be delivered through a UEFI firmware update, so if your motherboard is no longer supported you would have to buy a new one. And for laptops and embedded devices having everything soldered in, the motherboard is basically the whole computer, so I don’t think it’s that much of an exaggeration.

      I guess it’s true that if you have ring 0 access you’re boned, bug if your ring 0 access gets upgraded into ring -2 access you are even more boned. They put those security boundaries in place for a reason after all.

  • Scrubbles@poptalk.scrubbles.tech
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    3
    ·
    3 months ago

    Man Intel really is paying off a lot of journalists to smear AMD while they are dealing with their rotting chips right now

  • تحريرها كلها ممكن@lemmy.ml
    link
    fedilink
    arrow-up
    7
    arrow-down
    2
    ·
    3 months ago

    Why is this downvoted? Isn’t ArsTechnica a trusted tech news site? It is not controversial even if it has a neolib/neocon leaning -I can never tell the two apart-.

    I can never understand why people would downvote someone sharing a news story.

  • Moonrise2473@feddit.it
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    3 months ago

    Assholes, they won’t fix Ryzen 3000s even if they still sell them - just bought a brand new boxed 3400g

  • brisk@aussie.zone
    link
    fedilink
    arrow-up
    2
    ·
    3 months ago

    After reading that whole article I feel no more enlightened.

    They mentioned secure boot, is secure boot part of the exploit or does the exploit invalidate secure boot?

    • Moonrise2473@feddit.it
      link
      fedilink
      arrow-up
      4
      ·
      3 months ago

      Because if I understood it right, it will be presented at DEFCON tomorrow, this news are just hyping it.

      We don’t know what is the install vector, it might be a non issue (for regular people) where you need a custom chip programmer and hands on the hardware