The only thing "special" here is that this appeared on Bruce Schneier's Cryptogram newsletter that was published today. A well-written, often fascinating, "free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise."
Back issues are available at <http://www.schneier.com/crypto-gram.html>. To subscribe, visit <http://www.schneier.com/crypto-gram.html> or send a blank message to [EMAIL PROTECTED] Crypto-Gram also has an RSS feed at <http://www.schneier.com/crypto-gram-rss.xml>. Rony > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Muli Ben-Yehuda > Sent: Sunday, August 15, 2004 17:01 > To: Danny Lieberman (Barak) > Cc: [EMAIL PROTECTED] > Subject: Re: Interesting AMD security vulnerability > > > On Sun, Aug 15, 2004 at 05:05:47PM +0200, Danny Lieberman > (Barak) wrote: > > > Here's an interesting hardware security vulnerability. > Turns out that > > it's possible to update the AMD K8 processor (Athlon64 or Opteron) > > microcode. And, get this, there's no authentication check. > > I don't see what's special about AMD here? you can do ucode > updates on Intel CPUs as well. > > Cheers, > Muli > -- > Muli Ben-Yehuda > http://www.mulix.org | http://mulix.livejournal.com/ > > ================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
