Did you check if your Windows is protected against the Meltdown and Spectre CPU Flaws?

Discussion in 'polls' started by Sampei Nihira, Jan 28, 2018.

?

Did you check if your Windows is protected against the Meltdown and Spectre CPU Flaws?

  1. Yes.

    21 vote(s)
    53.8%
  2. No.

    5 vote(s)
    12.8%
  3. I do not care.

    8 vote(s)
    20.5%
  4. I only installed the patch.

    5 vote(s)
    12.8%
  1. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    Which tools did you use?
    Which tools you prefer?
     
  2. ZMsiXone

    ZMsiXone Registered Member

    Joined:
    Mar 30, 2017
    Posts:
    326
    Location:
    EUROPE/poland/germany
    Last edited: Jan 28, 2018
  3. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,549
    Location:
    Triassic
    I know that all my systems are at risk and I have both Intel and AMD systems. I didn't need tools to tell me that.

    • The Meltdown vulnerabilities are patched on both Linux and Microsoft systems, but I accept that the initial patches will not be enough.
    • Though a BIOS update is required for Spectre variant 2, I do not expect to see one for any of my systems
    • I have a test system.

    NB: I am following the thread here on Wilders that is hosted by Itman, on this subject. Many thanks to you guys.
     
  4. Buddel

    Buddel Registered Member

    Joined:
    Apr 28, 2015
    Posts:
    1,951
    I would have liked to tick two options: No and I do not care.
    Only one options could be ticked, so I chose I do not care.
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    I only installed patches for OS and browsers.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I used the InSpectre tool from Gibson Research. According to certain online tests, not all browsers are vulnerable, not sure what to think about it.

    To be honest, I can't believe that those guys are still at it, it's not THAT interesting to me.
     
  7. lofac

    lofac Registered Member

    Joined:
    Jan 18, 2018
    Posts:
    125
    Location:
    .
    +1
    Personally to run into malware (software) utilizing those vulnerabilities are very low to non-existence. though, I have potential mitigation by disabling JS in browser using NoScript.
     
  8. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    I think that from security perspective Meltdown is resolved. It was clear for OS vendors what to do about Meltdown. They were and are not happy, because patches made performance degradation and required changing decades-old, well-tested and reliable code in kernel. There is a great chance stability bugs were introduced by patching.
    Spectre is another thing. I expect some more Windows 10 hardening in Redstone 4 and 5 releases, but also in next .Net environment, C,C++ compilers, browsers and CPU microcode versions. Keep in mind compiler updates means delivery of rebuilded software from all kind of software vendors to make any difference.
     
  9. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    I prefer to use:

    XP = Stephanvandekerkhof Poc recompiled by UCyborg.
    W.10 = MeltdownSpectreReport.ps1.
     
    Last edited: Jan 28, 2018
  10. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,351
    Location:
    Europe, UE citizen
    Yes. Meltdwon protected, Spectre not. MS patched, usual multi layer defense. I don't want to try provisional BIOS patch, neither to obsess myself. I wait for better solutions. The thread "Kernel memory leaking' Intel... " is interesting by a theoretical perspective, but too boring to try all.
     
  11. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,549
    Location:
    Triassic
    We have not seen any exploits for Meltdown. When that happens, the mitigations will be tested. The system is now actually 'less vulnerable'.

    Spectre is the monster in the swamp.
    - It is threatening the existence of cloud computing because it is based on sharing. It is extremely vulnerable.
    - Current silicon mitigation is merely a stopgap.
    - PCID etc is a benefit, but does not fully mitigate the issue(s).
    - BIOS updates are minor toggles (the BIOS itself is not changed).
    - Spectre free silicon will arrive by year end 2018 - absolute nonsense!

    Tools are going to indicate 'vulnerable' for Spectre until new hardware is available to all. The recompiling fest will begin and more sophisticated tools will be required to determine either success or failure. Years from now.
     
    Last edited: Jan 29, 2018
  12. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    Users of OSes on FOSS are in better position. Especially Gentoo Gnu/Linux distro users are in favorable position. They can compile whole OS when they want typing one command ;)
     
  13. SouthPark

    SouthPark Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    737
    Location:
    South Park, CO
    I checked with Gibson's InSpectre, and got the results I expected, lol.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.