Intel has literally done this, and stuff like it before.
They back “independent” researchers who twist themselves in knots to make AMD look bad.
Look up the multiple counts of bullshit from a “research group” called Principled Technologies.
Sidenote: the guy who ran it was Ryan Shrout, who used to work for PC Perspective, and would usually give favourable reviews to Intel. After leaving Principled Technologies, he got a high up marketing position at… drumroll… Intel!
Principled Technologies isn’t the only scam “independent researcher” Intel has set up or paid handsomely either.
Drathro@dormi.zone 5 months ago
Difficult to exploit, already in the process of being patched. Truly, the most breaking of news.
httperror418@lemmy.world 5 months ago
How does the patch actually get delivered? Via windows update or using something else?
Passerby6497@lemmy.world 5 months ago
Most likely. Windows update (or the Linux equivalent on your platform) will download updated microcode to load at boot time to basically be a software patch for hardware issues. At least, that’s how it was explained when the original speculative execution flaw was discovered and Intel was releasing foxes and shit for it.
amanda@aggregatet.org 5 months ago
I realise this is an autocorrect error, but it’s still funny 🦊
Drathro@dormi.zone 5 months ago
On windows the article mentioned being a microcode patch via Windows update. Linux would be similar- but via a kernel update most likely. I’d assume that a general BIOS update would also do the trick, but then you’re relying on motherboard vendors and it’s unlikely many would provide such an update to older hardware, even if it’s still widely used.