Comment first (strike) post (Score -1) 100
Or maybe its all a legend because an internal tool got discovered by private industry.
Or maybe its all a legend because an internal tool got discovered by private industry.
"said Bastian Hacker, a researcher at the Max Planck" nevermind, lmao.
ok, wtf does this mean?
Mostly CIA dude lol
The research that lead to our public awareness of all of this was first published 6/27/2017. Appears to have been partially funded under DARPA Contract #FA8650-16-C-7622 (looking for attacks to fully recover private RSA keys). Our side and partners were funding research into recovering SSH private keys in a cloud environment. Same DARPA Contract # is listed under acknowledgements on https://meltdownattack.com/.
That DARPA Contract # lead to the research that was first published on 6/27/2017 by the international association of cryptology researchers here:
https://eprint.iacr.org/2017/627.pdf
This research was then used by various security interests to develop the proof of concept code for our side to exploit speculative-execution as a security vulnerability in early December last year.
Where did speculative-execution come from originally if the public story is Intel invented it? It came from the Russian military. They developed it 20 years before they weaponized it on us. Only known specter exploits can be patched...
We can all thank Vladimir Pentkovski for bringing speculative execution to Intel processors... and compromising our national security:
https://www.theregister.co.uk/1999/06/07/intel_uses_russia_military_technologies/
This will also get modded down because they don't want anyone to read this links and connect these dots - but fwiw
The research that lead to our public awareness of all of this was first published 6/27/2017. Appears to have been partially funded under DARPA Contract #FA8650-16-C-7622 (looking for attacks to fully recover private RSA keys). Our side and partners were funding research into recovering SSH private keys in a cloud environment. Same DARPA Contract # is listed under acknowledgements on https://meltdownattack.com/.
That DARPA Contract # lead to the research that was first published on 6/27/2017 by the international association of cryptology researchers here:
https://eprint.iacr.org/2017/627.pdf
This research was then used by various security interests to develop the proof of concept code for our side to exploit speculative-execution as a security vulnerability in early December last year.
Where did speculative-execution come from originally if the public story is Intel invented it? It came from the Russian military. They developed it 20 years before they weaponized it on us. Only known specter exploits can be patched...
We can all thank Vladimir Pentkovski for bringing speculative execution to Intel processors... and compromising our national security:
https://www.theregister.co.uk/1999/06/07/intel_uses_russia_military_technologies/
Good info - but... dated 2018. I don't trust "non-durable media" anymore
The research that lead to our public awareness of all of this was first published 6/27/2017. Appears to have been partially funded under DARPA Contract #FA8650-16-C-7622 (looking for attacks to fully recover private RSA keys). Our side and partners were funding research into recovering SSH private keys in a cloud environment. Same DARPA Contract # is listed under acknowledgements on https://meltdownattack.com/.
That DARPA Contract # lead to the research that was first published on 6/27/2017 by the international association of cryptology researchers here:
https://eprint.iacr.org/2017/627.pdf
This research was then used by various security interests to develop the proof of concept code for our side to exploit speculative-execution as a security vulnerability in early December last year.
Where did speculative-execution come from originally if the public story is Intel invented it? It came from the Russian military. They developed it 20 years before they weaponized it on us. Only known specter exploits can be patched...
We can all thank Vladimir Pentkovski for bringing speculative execution to Intel processors... and compromising our national security:
https://www.theregister.co.uk/1999/06/07/intel_uses_russia_military_technologies/
Yup, because their Remote Viewing skills are so much more advanced than our own. Probably the alien DNA.
Previous RV (Remote Views) left me thinking it was everything for the last 5 years at least that was hardware compromised by our side. I didn't even think about RV'ing for the other side. Additional sessions have lead me to believe that everything on our side has been hardware compromised for over the last 20 years by the Russian military.
Here are the following dots to connect for an RV confirm:
The research that lead to our public awareness of all of this was first published 6/27/2017. Appears to have been partially funded under DARPA Contract #FA8650-16-C-7622 (looking for attacks to fully recover private RSA keys). Our side and partners were funding research into recovering SSH private keys in a cloud environment. Same DARPA Contract # is listed under acknowledgements on https://meltdownattack.com/.
That DARPA Contract # lead to the research that was first published on 6/27/2017 by the international association of cryptology researchers here:
https://eprint.iacr.org/2017/627.pdf
This research was then used by various security interests to develop the proof of concept code for our side to exploit speculative-execution as a security vulnerability in early December last year - with Intel only informing Microsoft. From what I can tell internally AWS blindsided. This was not a controlled disclosure afaik from RV sessions.
Now shit gets real. Where did speculative-execution come from originally if the public story is Intel invented it. From additional RV session work I believe: It came from the Russian military. They developed it 20 years before they weaponized it on us. Only known specter exploits can be patched...
Can we all thank Vladimir Pentkovski for bringing speculative execution to Intel processors?
https://www.theregister.co.uk/1999/06/07/intel_uses_russia_military_technologies/
And still keep reading.
in like 10 years lol
That's was my experience too - and exactly what I did. I quadrupled though.
Agreed - add another 100k to that just to get anybody worth a shit in the Atlanta market.... where the cost of living is dirt cheap compared to living in Mountain View.
If you got some Java - try your hand at Scala. Huge market demand is building over the new few years expect it to explode. We still have a few slots left open at TST:
https://www.tstllc.net/careers#Software_Developer
Computer programmers do it byte by byte.