Sign recent changes

This commit is contained in:
nopenothinghere
2023-08-09 14:08:34 -04:00
parent 57698e248d
commit bc4fea42a4
179 changed files with 543 additions and 532 deletions

View File

@@ -18683,6 +18683,17 @@ measuring time, making it easier to exploit.</li>
- Retbleed focuses on return instructions, which are part of the
retpoline software mitigation against the speculative execution class of
attacks that became known starting early 2018, with Spectre.</li>
<li><a href="https://downfall.page/">Downfall</a> <sup><a href="https://web.archive.org/web/20230809145002/https://downfall.page/">[Archive.org]</a></sup>
- Gather Data Sampling (GDS) and Gather Value Injection (GVI) techniques
exploit the <strong>gather</strong> instruction to steal information
from <a href="https://en.wikipedia.org/wiki/Single_instruction,_multiple_data">SIMD
register buffers</a> and victim processes.</li>
<li><a href="https://comsec.ethz.ch/research/microarch/inception/">Phantom
&amp; Inception</a> <sup><a href="https://web.archive.org/web/20230809095321/https://comsec.ethz.ch/research/microarch/inception/">[Archive.org]</a></sup>
- Attacks that leak arbitrary data using seemingly “phantom”
instructions on AMD Zen CPUs; “[making] it take wrong actions based on
supposedly self conceived experiences”, an allusion to the Inception
movie, one we have made before.</li>
</ul>
<h1 id="appendix-b6-warning-for-using-orbot-on-android">Appendix B6:
Warning for using Orbot on Android</h1>