Antwort auf den Beitrag "Re:RAMBleed: Reading Bits in Memory Without Accessing Them" posten:
nickname
passwort
titel
>>>[https://rambleed.com/] >>> >>>As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. However, RAMBleed can be used for reading other data as well. >>> >>>Ja geil... >> >>Dann aber fix mal schnell alles auf DDR4 hochziehen. Hab's eben mal dem Admin gezeigt. Weisere Worte wurden selten gesprochen: „Oh, Scheiße!“ ;) > >DDR4 supports a defensive technique called Targeted Row Refresh, but its efficacy is uncertain >[https://www.theregister.co.uk/2019/06/11/rambleed_rowhammer_attack/] >Mal schauen was da noch kommt.
mailbenachrichtigung?