I’m very very sorry, that you think I’m NOT understanding „Specter" and what 
this shows. - I understand this very well! ;)

FOR YOU:
======
PLEASE look at the possibilities of the new version 57.0.4 of Firefox. With 
this special created release (of this browser) you can PATCH the Microcode 
AGAINST Specter!
 ==> So this shows, that there IS an easy way for doing Microcode changes in 
user-mode! AND this also demonstrate, that quite the same can be done to change 
the Microcode AGAIN WITHOUT to be sure the new (now may be hacked) code-change 
come from intel or NOT! —> AND to start this CHANGE you just click on a 
„special-button". If such is possible without asking for any system passwords 
THIS is a huge security problem !!!

In such a case a „user" don’t know, what’s realy going on and ALL normal OS & 
FW - checks looks to be sending green flags! 
THIS IS CREASY DANGEROUS and should NOT be possible on any secure system!

Whenever we change things, we trust on the SW-sources. THIS I UNDERSTAND VERY 
WELL.

But in this case (Spectre) just a "bad website" can be used to reed data from 
other areas. This is possible because of some side-effect the current Microcode 
has. If we can FIX that with the special version (57.0.4) of Firefox, a hacker 
can change it back again with an other program and no one knows! - After this 
he just need a "bad website" to get datas AGAIN.

PLEASE:
Before you send me your next quick answer, PLEASE read my E-Mail very carefully 
and try to understand WHAT I’m talking about.
IT IS SERIOUS and IMPORTANT. ==> I’m NOT talking about what Spectre does (this 
is clear); I’ afraid HOW we can patch the Microcode to let them NOT allow this 
AND how easy it will be to let them allow to enable this/such again.

MEMO: Linus Torvalds is also very unhappy with the actual situation!
http://www.pcgameshardware.de/CPU-Hardware-154106/News/Meltdown-Spectre-Linux-Linus-Torvalds-1247248/
 
<http://www.pcgameshardware.de/CPU-Hardware-154106/News/Meltdown-Spectre-Linux-Linus-Torvalds-1247248/>

Kind regards
Patrik
 


ifs³ Consulting+Engineering
Patrik Lori
CTO, cert. Computer Engineer & MAS-BA
Panoramastr. 6, 5625 Kallern, Switzerland
 
Web:        http://www.ifs3.com <http://www.ifs3.com/>
Email:      patrik.l...@ifs3.com <mailto:patrik.l...@ifs3.com>
Mobile:    +41 79 326 75 97
 
CONFIDENTIALITY NOTICE: This e-mail message including attachments, if any, is 
intended only for the person or entity to which it is addressed and may contain 
confidential and/or privileged material. Any unauthorised review, use, 
disclosure or distribution is prohibited. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message. If you are the intended recipient but do not wish to 
receive communications through this medium, please do advise the sender 
immediately.

> Am 08.01.2018 um 21:09 schrieb Felix Winterhalter <fe...@audiofair.de>:
> 
>> Sorry it’s NOT enough. Don’t worry I trust Intel for changing Intel CPUs; I 
>> trust AMD for changing AMD CPUs, etc. NO problem with that! - But
>> 
>> SIMPLYFYED:
>> How can Firefox 57.0.4 change the Intel CPU/MMU - Microcode if such change 
>> need a secret code signature and don’t know anything secured from my CPU?
>> 
>> If a Browser-SW can change it (I hope this SW is running in user-mode), a 
>> "tarned Hacker-SW" can change it to !!!
>> 
> I do not know where you got the impression that this is possible. As it isn't.
> 
> The Meltdown and Specter vulnerabilities have nothing whatsoever to do with 
> putting "hacked microcode" or something like that on the CPU. I suggest you 
> read up on how these vulnerabilities actually work before posting messages 
> such as this or for that matter look up what exactly microcode IS as it seems 
> you have a bit of a misconception about the nature of it.
> 
> In essence they use features that are already in the CPU in a way that allows 
> them to gain knowledge of privileged information. They don't put anything 
> malicious onto the CPU especially not something that would "stay there", 
> "hacker software", "malware" or anything of the sort. They use normal 
> operation features of modern CPUs in order to defeat higher level protection 
> mechanisms. 
>> For me this is NOT a trustful way for such an important change and need to 
>> be addressed very seriously to the HW manufactories. 
>> If your org can help for this, it’s great.
>> 
> Sooo installing updates onto your system by downloading them is also not a 
> trustful way for updates to arrive? You want to chisel those onto your 
> harddrive manually? On Windows I think every user has the right to install 
> updates even ... which makes sense in a way. 
> 
> I do not really get what your issue is. As long as you trust that a signature 
> for an update is not compromised you should be fine installing that signed 
> update ( as long as you trust updates in general ). 
> 
> Your main problem really seems to be a misconception about the way these 
> vulnerabilities work and what exactly exploiting them entails. 
> 

Reply via email to