On Tuesday, an international team of researchers unveiled BadRAM, a proof-of-concept attack that completely undermines security assurances that chipmaker AMD makes to users of one of its most expensive and well-fortified microprocessor product lines. Starting with the AMD Epyc 7003 processor, a feature known as SEV-SNP—short for Secure Encrypted Virtualization and Secure Nested Paging—has provided the cryptographic means for certifying that a VM hasn’t been compromised by any sort of backdoor installed by someone with access to the physical machine running it.

  • Dark ArcA
    link
    fedilink
    English
    arrow-up
    34
    ·
    20 hours ago

    Kinda annoyed with Ars for perpetuating this trend of dramatized security vulnerability names and descriptions.

    • Bakkoda@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      15 hours ago

      Ars went the way of Toms a while ago for me. There’s some decent stuff to be found but most of it is click/rage bait.

      • Dark ArcA
        link
        fedilink
        English
        arrow-up
        2
        ·
        13 hours ago

        I still think it’s generally more good than bad and I appreciate they provide an authenticated ad free RSS feed for subscribers, but I think this was one of their worst headlines.