mirror of
https://github.com/Anon-Planet/thgtoa.git
synced 2026-03-22 04:33:26 +01:00
Sign recent changes
This commit is contained in:
@@ -18683,6 +18683,17 @@ measuring time, making it easier to exploit.</li>
|
||||
- Retbleed focuses on return instructions, which are part of the
|
||||
retpoline software mitigation against the speculative execution class of
|
||||
attacks that became known starting early 2018, with Spectre.</li>
|
||||
<li><a href="https://downfall.page/">Downfall</a> <sup><a href="https://web.archive.org/web/20230809145002/https://downfall.page/">[Archive.org]</a></sup>
|
||||
- Gather Data Sampling (GDS) and Gather Value Injection (GVI) techniques
|
||||
exploit the <strong>gather</strong> instruction to steal information
|
||||
from <a href="https://en.wikipedia.org/wiki/Single_instruction,_multiple_data">SIMD
|
||||
register buffers</a> and victim processes.</li>
|
||||
<li><a href="https://comsec.ethz.ch/research/microarch/inception/">Phantom
|
||||
& Inception</a> <sup><a href="https://web.archive.org/web/20230809095321/https://comsec.ethz.ch/research/microarch/inception/">[Archive.org]</a></sup>
|
||||
- Attacks that leak arbitrary data using seemingly “phantom”
|
||||
instructions on AMD Zen CPUs; “[making] it take wrong actions based on
|
||||
supposedly self conceived experiences”, an allusion to the Inception
|
||||
movie, one we have made before.</li>
|
||||
</ul>
|
||||
<h1 id="appendix-b6-warning-for-using-orbot-on-android">Appendix B6:
|
||||
Warning for using Orbot on Android</h1>
|
||||
|
||||
Reference in New Issue
Block a user