Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: markomalley; Chgogal; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; ...
Another thread on the processor vulnerabilities, but this one is a bit more informative. The two vulnerabilities are "Meltdown" which affects the Intel line of processors made in the last decade, and "Spectre" which targets AMD and ARM processors.

For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017. The takeaway for the "Spectre" vulnerability is that it requires not only physical access to an Apple iPhone/IPad, but the user's passcode to be able to install malware onto the device. I quote from the description of the Spectre vulnerability potential to be exploited:
"In order to exploit the flaw the "attacker gains physical access by manually updating the platform with a malicious firmware image through flash programmer physically connected to the platform’s flash memory. "
This means that neither "Meltdown" or "Spectre" is a threat to Apple users at this time. — PING!

Thanks to Chgogal for the ping!


Apple Not Vulnerability to "Meltdown" and "Spectre" Malware
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

28 posted on 01/03/2018 8:14:40 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Swordmaker

Thanks. I knew you could translate for us.


29 posted on 01/03/2018 8:18:30 PM PST by blu (If you don't read the story at the link, don't comment. (Except for Laz...))
[ Post Reply | Private Reply | To 28 | View Replies ]

To: Swordmaker
For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017.

Forgot to mention that Apple closed that door with the release of macOS 10.13.2 High Sierra. If you are not running that version of macOS, you may still be vulnerable. It STILL requires physical access to your Mac to install firmware to exploit this vulnerability and Apple has already closed the door for that, even with Root access. Firmware modification access now requires an additional password above even Root on a Mac.

33 posted on 01/03/2018 8:32:08 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 28 | View Replies ]

To: Swordmaker

Thanks. All my work devices are IoS.

L


40 posted on 01/04/2018 5:53:26 AM PST by Lurker (President Trump isn't our last chance. President Trump is THEIR last chance.)
[ Post Reply | Private Reply | To 28 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson