>
Conservatives Are Being Targeted – Louder with Crowder CEO Warns / Redacted
"Liz Reitzig: Raw Milk Revolution"
Court Clears Trump to Defund Planned Parenthood
PepsiCo, Mars, ADM team up for regenerative agriculture project in Poland
Tesla Megapack Keynote LIVE - TESLA is Making Transformers !!
Methylene chloride (CH2Cl?) and acetone (C?H?O) create a powerful paint remover...
Engineer Builds His Own X-Ray After Hospital Charges Him $69K
Researchers create 2D nanomaterials with up to nine metals for extreme conditions
The Evolution of Electric Motors: From Bulky to Lightweight, Efficient Powerhouses
3D-Printing 'Glue Gun' Can Repair Bone Fractures During Surgery Filling-in the Gaps Around..
Kevlar-like EV battery material dissolves after use to recycle itself
Laser connects plane and satellite in breakthrough air-to-space link
Lucid Motors' World-Leading Electric Powertrain Breakdown with Emad Dlala and Eric Bach
Murder, UFOs & Antigravity Tech -- What's Really Happening at Huntsville, Alabama's Space Po
Last week, two substantial software flaws were unearthed to the technological public to much alarm. The vulnerabilities, dubbed Meltdown and Spectre by their finders, exploit weaknesses in the computer processors (CPUs) used in most of the world's PCs, smartphones, and data hubs. These developments have raised questions the world over about the security of private data, leaving the cryptocurrency community wondering what this may mean for the safety of personal wallet funds and exchange reserves.
Implications for the Crypto Realm
Together, Meltdown and Spectre attacks can affect processing chips produced by Intel, AMD, and ARM, and its discoverers have called them "the worst GPU bugs ever found." According to the researchers who discovered the flaws, the attacks can steal information from services and applications that a computer's GPU processes:
"These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents."
Michael Schwarz, one of the vulnerabilities' discoverers, illustrates how Meltdown works in a visual tweet: