On Tuesday, January 9, 2018 at 2:35:28 PM UTC-5, Chris Laprise wrote: > On 01/09/2018 05:17 AM, Roy Bernat wrote: > > On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com wrote: > >> On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote: > >>> On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote: > >>>> -----BEGIN PGP SIGNED MESSAGE----- > >>>> Hash: SHA256 > >>>> > >>>> On 01/09/2018 12:07 AM, Roy Bernat wrote: > >>>> > >>>>> What about release rc04? it should be release at 8/1 that was > >>>>> yesterday . > >>>> > >>>> Delayed until the devs have a good workaround for SP1/SP2/Spectre. > >>>> > >>>> /Sven > >>>> -----BEGIN PGP SIGNATURE----- > >>>> > >>>> iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U > >>>> H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1 > >>>> hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5 > >>>> lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau > >>>> aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA > >>>> VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv > >>>> X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs > >>>> u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F > >>>> h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv > >>>> 2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU > >>>> 54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS > >>>> k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY= > >>>> =59oT > >>>> -----END PGP SIGNATURE----- > >>> > >>> Great time to be using a AMD chipset as they are not effected. Wonder > >>> if something like this would have been caught years ago if the microcode > >>> was open? > >>> > >>> This is a big one in terms of the effects it has when mitigated at the > >>> software level. I wonder what the performance hit will be from > >>> application of whatever patch route Qubes takes? Projections of 5-30% > >>> hit. > >>> > >>> As I said Great day for AMD stock LOL > >> > >> AMD is affected by the SP1/SP2/Spectre as well as Intel and ARM. > > > > So he can not dance :) > > > > From my recollection of AMD statements: > > SP1: Very hard to exploit on any CPU > > SP2: Much harder to exploit on AMD than Intel > > SP3/Meltdown: AMD not affected > > -- > > Chris Laprise, tas...@posteo.net > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
that sounds correct based on what I have read. At first AMD claimed it was not effected but it seems as time went on and it was looked at more carefully that has changed. Still I will take more difficult. As AMD has such a small share of processor space it makes it a lower target sort of how Apple use to be to windows and linux still is although not like it use to be. So really with a qubes WS the main issue would be SP2 mitigation. Amazing this has been an issue for 10yrs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5d30b510-7df0-44cc-8930-adb1883cc208%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.