Added video author of "URL recorery" into Vulnerabilidad MDS en procesadores Intel
This commit is contained in:
parent
5f7c730c82
commit
412e11379e
@ -32,6 +32,10 @@ de ejecución especulativa de la CPU.
|
||||
pero los ataques MDS podrían leer los datos en los diferentes búferes
|
||||
de la CPU (Hilos).
|
||||
|
||||
## Ejemplo de ataque:
|
||||
|
||||
### URL Recovery
|
||||
|
||||
<video class="player-ply" playsinline controls>
|
||||
<source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm">
|
||||
<p>Lo siento, tu navegador no soporta HTML 5. Por
|
||||
@ -69,9 +73,14 @@ de Intel al mismo tiempo se publicó una [noticia][new] en su web oficial.
|
||||
|
||||
[Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling)
|
||||
|
||||
#### Autor del vídeo "URL Recovery":
|
||||
|
||||
[Cyberus Technology GmbH][cyberus]
|
||||
|
||||
<!--Plyr-->
|
||||
<script src="{static}/vendor/js/play.js"></script>
|
||||
<!--EndPlyr-->
|
||||
|
||||
[cyberus]: https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
|
||||
[MDS]: https://git.hyperbola.info:50100/packages/core.git/commit/?id=25b9c740344ffc4bbdbe128794fc24c3b990ae59
|
||||
[new]: https://www.hyperbola.info/news/hyperbola-users-are-now-mitigated-against-microarchitectural-data-sampling-mds-vulnerabilities/
|
||||
|
Loading…
x
Reference in New Issue
Block a user