Added video author of "URL recorery" into Vulnerabilidad MDS en procesadores Intel

This commit is contained in:
Jesús 2019-05-18 14:13:51 -05:00
parent 5f7c730c82
commit 412e11379e
No known key found for this signature in database
GPG Key ID: F6EE7BC59A315766

View File

@ -32,6 +32,10 @@ de ejecución especulativa de la CPU.
pero los ataques MDS podrían leer los datos en los diferentes búferes pero los ataques MDS podrían leer los datos en los diferentes búferes
de la CPU (Hilos). de la CPU (Hilos).
## Ejemplo de ataque:
### URL Recovery
<video class="player-ply" playsinline controls> <video class="player-ply" playsinline controls>
<source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm"> <source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm">
<p>Lo siento, tu navegador no soporta HTML 5. Por <p>Lo siento, tu navegador no soporta HTML 5. Por
@ -69,9 +73,14 @@ de Intel al mismo tiempo se publicó una [noticia][new] en su web oficial.
[Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling) [Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling)
#### Autor del vídeo "URL Recovery":
[Cyberus Technology GmbH][cyberus]
<!--Plyr--> <!--Plyr-->
<script src="{static}/vendor/js/play.js"></script> <script src="{static}/vendor/js/play.js"></script>
<!--EndPlyr--> <!--EndPlyr-->
[cyberus]: https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
[MDS]: https://git.hyperbola.info:50100/packages/core.git/commit/?id=25b9c740344ffc4bbdbe128794fc24c3b990ae59 [MDS]: https://git.hyperbola.info:50100/packages/core.git/commit/?id=25b9c740344ffc4bbdbe128794fc24c3b990ae59
[new]: https://www.hyperbola.info/news/hyperbola-users-are-now-mitigated-against-microarchitectural-data-sampling-mds-vulnerabilities/ [new]: https://www.hyperbola.info/news/hyperbola-users-are-now-mitigated-against-microarchitectural-data-sampling-mds-vulnerabilities/