To: markomalley; Chgogal; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; ...
Another thread on the processor vulnerabilities, but this one is a bit more informative. The two vulnerabilities are "Meltdown" which affects the Intel line of processors made in the last decade, and "Spectre" which targets AMD and ARM processors.
For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017. The takeaway for the "Spectre" vulnerability is that it requires not only physical access to an Apple iPhone/IPad, but the user's passcode to be able to install malware onto the device. I quote from the description of the Spectre vulnerability potential to be exploited:
"In order to exploit the flaw the "attacker gains physical access by manually updating the platform with a malicious firmware image through flash programmer physically connected to the platforms flash memory. "
This means that neither "Meltdown" or "Spectre" is a threat to Apple users at this time. PING! Thanks to Chgogal for the ping!
Apple Not Vulnerability to "Meltdown" and "Spectre" Malware
Ping!
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
28 posted on
01/03/2018 8:14:40 PM PST by
Swordmaker
(My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
To: Swordmaker
Thanks. I knew you could translate for us.
29 posted on
01/03/2018 8:18:30 PM PST by
blu
(If you don't read the story at the link, don't comment. (Except for Laz...))
To: Swordmaker
For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017. Forgot to mention that Apple closed that door with the release of macOS 10.13.2 High Sierra. If you are not running that version of macOS, you may still be vulnerable. It STILL requires physical access to your Mac to install firmware to exploit this vulnerability and Apple has already closed the door for that, even with Root access. Firmware modification access now requires an additional password above even Root on a Mac.
33 posted on
01/03/2018 8:32:08 PM PST by
Swordmaker
(My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
To: Swordmaker
Thanks. All my work devices are IoS.
L
40 posted on
01/04/2018 5:53:26 AM PST by
Lurker
(President Trump isn't our last chance. President Trump is THEIR last chance.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson