Date: Sun, 15 May 2005 12:59:26 +0200 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: Colin Percival <cperciva@freebsd.org> Cc: Nate Lawson <nate@root.org> Subject: Re: cvs commit: src/sys/amd64/amd64 mp_machdep.c src/sys/amd64/include cpufunc.h src/sys/i386/i386 mp_machdep.c src/sys/i386/include cpufunc.h Message-ID: <97079.1116154766@critter.freebsd.dk> In-Reply-To: Your message of "Sun, 15 May 2005 02:05:25 EDT." <4286E6A5.4030902@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <4286E6A5.4030902@freebsd.org>, Colin Percival writes: >Nate Lawson wrote: >> That is at best, hyperbole. > >Have you been talking to Intel lately? > >> Crypto implementations which properly >> implement blinding or operate in constant time are not vulnerable. > >Crypto implementations which implement blinding are vulnerable. This is not just about crypto. There are many processes which a random process should not be allowed to spy on in a multiuser system. Your boss text-procssing or email program for one thing. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?97079.1116154766>