Pretty sure at the end of all that waiting there will be the invariable pointing of fingers at anything but yourself. And I've seen this 1000 times.Then again people have been known to save their credentials on internet cafe computers because it was too much of a bother to enter them 2-3 times. Why would a stuttering game be any different?But you're right, this should not be confused with vaccination. That's a whole different ballgame with different stakes.

Aquinus

Resident Wat-man

I know that it was proven that spectre was a valid exploit but, the simple fact on how it works makes it really hard to actually use for malicious intent. Exposing 1,400 to 2,000 bytes a second (unmitigated,) bit by bit and not all at once, only makes it useful if you know where something is and know that it's not changing or being moved somewhere else. On top of that, the machine also has to be compromised and it needs to be in a sufficiently low level language to exploit how the instructions get compiled, so basically C is your only real option. You also need to know exactly where the data you want is. There have been proof of concepts showing how restricted memory can be accessed but, have there been any proof on concepts actually trying to get secure data rather than bytes set by the developer in the PoC environment? Memory tends to change in an active system quite a bit. Pages get moved, swapped out and in, and actively changed by whatever is going on. Where and when are two very huge factors when trying to exploit spectre.



So, this exploit has been known for a while now, right? Has any malicious software actually been identified as trying to use this exploit and being successful at it? Is it even feasible? I know it can be done but, is it realistic?