TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Memory Deduplication: The Curse That Keeps on Giving

4 pointsby iliaskuover 8 years ago

1 comment

iliaskuover 8 years ago
tlds: they used the side-channel leakage together with rowhammer to flip bits in ssh public keys in memory from authorized_keys to convert them so they could factor them, generate a new private key and eventually log in. also, sources.list and the system gpg-keychain to point the system to a malicious repo and install a backdoored /bin/ls