Twitter | Search | |
Paul Thurrott 3 Jan 18
Replying to @ryanshrout
Was this delivered on a 1099 form?
Reply Retweet Like
Ryan Shrout 3 Jan 18
Replying to @thurrott
I had to sign and date it, so probably?
Reply Retweet Like
Cheshire Merc Cat 3 Jan 18
Replying to @ryanshrout
Which one of those does the PTI patch fix? Then Rogue Data one?
Reply Retweet Like
Ryan Shrout 3 Jan 18
Replying to @Cat_Merc
Yes.
Reply Retweet Like
NerdTech 3 Jan 18
Replying to @ryanshrout
Also to clarify, the Google team only demonstrated functional exploit PoC on FX CPUs (FX8320 & A-10), not Zen. Zen AFAIK is immune to all 3 exploits.
Reply Retweet Like
MonochroMe 4 Jan 18
It is not. Other security team tested Ryzen and confirmed it's not immune to #1 Sepctre.
Reply Retweet Like
Kevin Krewell 3 Jan 18
Replying to @ryanshrout
Variant #1 still required a SW change. So AMD's statement is not quite right.
Reply Retweet Like
Ryan Shrout 3 Jan 18
Replying to @Krewell
Its statement claims its resolved.
Reply Retweet Like
asd 3 Jan 18
Yes. Corporate trying to save their asses with doublespeak. That statement means nothing and nothing should be understood or inferred from it. The NDA on the vulnerability is supposed to be lifted tomorrow, so we'll see what's actually going on.
Reply Retweet Like
T1beriu 3 Jan 18
Reply Retweet Like