On Thu, 4 Jan 2018 05:07:03 -0600, Elardus Engelbrecht wrote:
>
>Now, those algorithms are exploited. Basically, you load a 'fetch protected' 
>address and then use/mis-use 'out of order execution' and 'speculative 
>execution' while messing around with the contents of CPU caches. 
>
>Long story, but in short, before you are interrupted because of fetch 
>protection, you can dump protected areas to somewhere else.
>
Is this likely to get worse with quantum computers, which are vastly more 
speculative?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to