On Wed, Aug 15, 2018 at 12:31:16AM -0600, Theo de Raadt wrote:
> We had some idea this class of problem was coming, through hints we
> received from others and an extremely cynical perspective that has
> developed.  We believe Intel cpus do almost no security checks up-front,
> but defer checks until instruction retire.  As a result we believe
> similar issues will be coming in the future.
> 
> We asked repeatedly, but Intel provided no advance notice.  We did not
> even receive replies to our requests for dialogue.

HardenedBSD received no advanced notice, either.

What's funny is that LWN, a Linux news outlet, might have:

https://twitter.com/grsecurity/status/1029476228288454657
https://twitter.com/grsecurity/status/1029476820553539584
https://twitter.com/grsecurity/status/1029482062724648965

If true, a Linux news outlet, which carries no actual security
responsibilities, received advanced notification, while certain
operating systems vendors did not.

But, again, this is just *speculation* at this point. ;)

Thanks,

-- 
Shawn Webb
Cofounder and Security Engineer
HardenedBSD

Tor-ified Signal:    +1 443-546-8752
Tor+XMPP+OTR:        latt...@is.a.hacker.sx
GPG Key ID:          0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89  3D9E 6A84 658F 5245 6EEE

Attachment: signature.asc
Description: PGP signature

Reply via email to