Social media users are creating their own Orwellian nightmare. It bothers very few. From Raúl Ilargi Meijer at automaticearth.com:
Happy belated new year. Belatedly. Thought I’d sit out a few days, since there wasn’t much news to be expected. And it did pan out that way, other than Trump bogarting the limelight; but then, that isn’t really news either. Anything he says or does triggers the expansive anti-Donald echo chamber into a daily frenzy. And frankly, guys, it’s not just boring, but you’re also continuously providing him with free publicity. At least make him work for some of it.
Then, however, the big microprocessor (chip) security ‘flaw’ was exposed. And that’s sort of interesting, because it concerns the basic architecture of basically every microchip produced in the past 20 years, even well before smartphones. Now, the first thing you have to realize is that we’re not actually talking about a flaw here, but about a feature. We use that line a lot in a half-jokingly version, but in this case it’s very much true. As Bloomberg succinctly put it:
All modern microprocessors, including those that run smartphones, are built to essentially guess what functions they’re likely to be asked to run next. By queuing up possible executions in advance, they’re able to crunch data and run software much faster. The problem in this case is that this predictive loading of instructions allows access to data that’s normally cordoned off securely..
Spectre fools the processor into running speculative operations – ones it wouldn’t normally perform – and then uses information about how long the hardware takes to retrieve the data to infer the details of that information. Meltdown exposes data directly by undermining the way information in different applications is kept separate by what’s known as a kernel, the key software at the core of every computer.
As I said: feature, not flaw (or two really, Spectre and Meltdown). And that makes one wonder: fixing a flaw is one thing, but how do you fix a feature? Several quotes claim that software patches would mean the performance speed of affected chips (that would be all of them) would go down by 25-30% or so. Which is bad enough, but the problem is not -limited to- software. And patching up hardware/firmware issues with software can’t be easy, if even viable.
That would make one suspect that even if a software patch can suppress this feature, as long as the architecture doesn’t change, it can still function as a backdoor. Apple may say there are no known exploits of it, but would they tell if for instance intelligence services used it? Or other parties that cannot be labeled ‘hackers’?
To continue reading: Big Brother = You