TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Update on Meltdown and Spectre

209 pointsby jordeover 7 years ago

14 comments

thisisitover 7 years ago
This announcement makes me wonder - Are there any banking laws to protect someone who loses money due to a hack?<p>The JS thing is a huge deal so someone might get their online banking credentials stolen and then account emptied. In which case, how helpful are the banks in helping to recover the money?<p>On the cryptocurrency side people need to secure their own money and ensure they don&#x27;t open some shady ICO site. So stolen credentials means the money is gone forever.<p>Edit: FDIC insurance is applicable for the banks ie if the banks get hacked. The question here is on individuals getting hacked. I am not able to find if FDIC covers that.
评论 #16076703 未加载
评论 #16076638 未加载
评论 #16076668 未加载
评论 #16076664 未加载
评论 #16076596 未加载
评论 #16076587 未加载
liamzebedeeover 7 years ago
[related] Has anyone considered the possibility of a Spectre-style attack in Ethereum&#x27;s Turing-complete EVM? Not that the state would be unique for all contracts, but there&#x27;s a possibility of communicating to an external contract with the output.
评论 #16076663 未加载
评论 #16076622 未加载
评论 #16076779 未加载
评论 #16076816 未加载
评论 #16076549 未加载
jngreenleeover 7 years ago
A notably worthy response while others aren&#x27;t handling it so well. It&#x27;s nowhere close to being Coinbase&#x27;s fault, but they are far in front the matter. Kudos.
macawfishover 7 years ago
I think this is a foreshadow of what&#x27;s to come with quantum computers. While side channel attacks aren&#x27;t directly related to quantum computing, they&#x27;re of a similar character. Quantum computing will enable new kinds of analysis that aren&#x27;t possible to do quickly right now, and exploits based on it will very likely take people by surprise in the same way that this one has... even those of us who saw it coming. It will be a weird, unsettling feeling when these classical cryptography algorithms, which everyone trusts so casually right now, start actually being compromised.
评论 #16076674 未加载
评论 #16076526 未加载
评论 #16076464 未加载
评论 #16076648 未加载
dukeflukemover 7 years ago
Possibly off topic, but is this a bad time to use any software that knows your cryptocurrency private keys. Such as wallet software?
评论 #16079743 未加载
benjaminjackmanover 7 years ago
&gt;Where we do run on shared hardware, we make it more difficult to accurately target one of our systems by rapidly cycling through instances in AWS.<p>Wait, doesn&#x27;t that just spray their sensitive information over more and more machines that may or may not be sufficiently wiped before it&#x27;s reassigned to someone else? Or increase the chance they encounter someone running one of these exploits panning for digital gold in the other users RAM?
评论 #16076598 未加载
评论 #16076583 未加载
评论 #16076958 未加载
wslhover 7 years ago
Knowing Coinbase uses AWS, they were my main concern: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16066221" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16066221</a><p>They answered fast.
shams93over 7 years ago
I really appreciate how coinbase is addressing this like Chase has sent nothing about this, coinbase in contrast is telling you how they handle transactions to minimize the potential damage and what they are doing to mitigate the issues on their end. Big thumbs up to coinbase for being aggressively and open about their response to this threat.
评论 #16079197 未加载
评论 #16079417 未加载
javertover 7 years ago
Don&#x27;t think this is right on one detail.<p>Spectre2 should allow malicious JavaScript to read data from other processes.<p>Running browser tabs in separate processes (e.g. Google Chrome&#x27;s new Site Isolation) should protect data from Spectre1 alone but not Spectre2.<p>See the table here:<p><a href="https:&#x2F;&#x2F;security.googleblog.com&#x2F;2018&#x2F;01&#x2F;more-details-about-mitigations-for-cpu_4.html" rel="nofollow">https:&#x2F;&#x2F;security.googleblog.com&#x2F;2018&#x2F;01&#x2F;more-details-about-m...</a><p>If that&#x27;s not right I&#x27;d love to be corrected.<p>Probably no known exploit of this yet.
评论 #16076425 未加载
评论 #16076539 未加载
评论 #16076308 未加载
matthewaveryusaover 7 years ago
How does cycling AWS instances quickly provide additional security beyond obscurity?
评论 #16076471 未加载
评论 #16076449 未加载
评论 #16076610 未加载
评论 #16076767 未加载
评论 #16076551 未加载
评论 #16076591 未加载
cookiecaperover 7 years ago
&gt; Coinbase runs in Amazon Web Services (AWS) and our general security posture is one of extreme caution.<p>Now more than ever, this statement just does not compute. What good reason could something as sensitive as Coinbase have to remain on a third-party cloud provider and let Amazon hold the keys to the kingdom, especially after this disclosure that informs us that our imagined VM sandboxes have been a fairy tale all along?<p>There&#x27;s a secret from a time not so long past that makes these attacks nearly-irrelevant: &quot;don&#x27;t run untrusted code&quot;. Maybe the corollary &quot;don&#x27;t run on hardware that runs untrusted code&quot; is necessary (though I personally feel it&#x27;s a little redundant).<p>It&#x27;s embarrassing that Coinbase would continue to expose their application to this attack surface after yesterday&#x27;s disclosures. Honestly, it should&#x27;ve been that way before; this isn&#x27;t the first time VM isolation has been broken, and it won&#x27;t be the last. It&#x27;s just the least-fixable breakage so far.<p>&gt; Sensitive workloads, especially where key handling is involved, run on Dedicated Instances (instead of shared hardware). Where we do run on shared hardware, we make it more difficult to accurately target one of our systems by rapidly cycling through instances in AWS.<p>I&#x27;m quoting this just because I know people will say I&#x27;m excluding the context if I don&#x27;t. If you&#x27;re going to run on &quot;dedicated instances&quot; anyway and pay the huge price premium for them, there&#x27;s no reason to continue to put your secrets in Amazon&#x27;s hands.<p>Little ragtag startups may use the excuse &quot;We&#x27;re scared of real sysadmins, they will laugh at us because they&#x27;re over 25&quot;, but that excuse should not work for something as big and serious as Coinbase.<p>Playing Instance Roulette by &quot;rapid cycling [instances]&quot; in hopes that you get away from any bad neighbors ASAP is extremely silly, <i>please</i> give me a break. Just buy some hardware. How is this so hard?
评论 #16076532 未加载
DennisAleynikovover 7 years ago
Glad to see coinbase communicating proactively to assess their own risk factors and let them be known
Taniwhaover 7 years ago
It&#x27;s a good thing no one will be running other people&#x27;s untrusted code on their servers ..... Except for etherium contracts of course .... Anyone want to place bets on how long it takes before someone releases a spectre exploit in a contract? I&#x27;ll take 4 days ....
评论 #16076879 未加载
grover_hartmannover 7 years ago
I won&#x27;t take anything Coinbase says seriously until they implement SegWit.