>
WATCH: Russia Downs Drone With Laser - Is This The Future Of Drone Defense?
What on earth is Trump up to regarding Ozempic?
Charged with 7 Counts of Espionage for the TRUTH | John Kiriakou
Goodbye, Cavities? Scientists Just Found a Way to Regrow Tooth Enamel
Scientists Say They've Figured Out How to Transcribe Your Thoughts From an MRI Scan
SanDisk stuffed 1 TB of storage into the smallest Type-C thumb drive ever
Calling Dr. Grok. Can AI Do Better than Your Primary Physician?
HUGE 32kWh LiFePO4 DIY Battery w/ 628Ah Cells! 90 Minute Build
What Has Bitcoin Become 17 Years After Satoshi Nakamoto Published The Whitepaper?
Japan just injected artificial blood into a human. No blood type needed. No refrigeration.
The 6 Best LLM Tools To Run Models Locally
Testing My First Sodium-Ion Solar Battery
A man once paralyzed from the waist down now stands on his own, not with machines or wires,...

Last week, two substantial software flaws were unearthed to the technological public to much alarm. The vulnerabilities, dubbed Meltdown and Spectre by their finders, exploit weaknesses in the computer processors (CPUs) used in most of the world's PCs, smartphones, and data hubs. These developments have raised questions the world over about the security of private data, leaving the cryptocurrency community wondering what this may mean for the safety of personal wallet funds and exchange reserves.
Implications for the Crypto Realm
Together, Meltdown and Spectre attacks can affect processing chips produced by Intel, AMD, and ARM, and its discoverers have called them "the worst GPU bugs ever found." According to the researchers who discovered the flaws, the attacks can steal information from services and applications that a computer's GPU processes:
"These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents."
Michael Schwarz, one of the vulnerabilities' discoverers, illustrates how Meltdown works in a visual tweet: