On Thu, 4 Jan 2018 05:07:03 -0600, Elardus Engelbrecht wrote: > >Now, those algorithms are exploited. Basically, you load a 'fetch protected' >address and then use/mis-use 'out of order execution' and 'speculative >execution' while messing around with the contents of CPU caches. > >Long story, but in short, before you are interrupted because of fetch >protection, you can dump protected areas to somewhere else. > Is this likely to get worse with quantum computers, which are vastly more speculative?
-- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
