All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Spectre reloaded: Spectre-BHB
How does this differ from Spectre-v2? BHI essentially is an extension of Spectre v2, where we leverage the global history to re-introduce the exploitation of cross-privilege BTI. Therefore the attacker primitive is still Spectre v2, but by injecting the history across privilege boundaries (BHI), we can exploit systems that deploy new in-hardware mitigations (i.e., Intel eIBRS and Arm CSV2).
Which systems are affected by BHI? Short answer: If you have an Intel or Arm CPU that was affected by Spectre-v2, you’re likely to be affected by BHI too. AMD seems not to be affected.
https://www.vusec.net/projects/bhi-spectre-bhb/
"We have leaked the root hash password"
Comments
At this rate it seems to me we should just go back to non-speculative execution based architectures.