You got to be kidding me. I wonder if this stuff can be exploited remotely, via a website? Or perhaps you need to run a malicious app for this.
FWIW: "Recently Discovered SSD Vulnerabilities Could Cripple Global Markets with Data Corruption if Exploited by Attackers ...Condusiv’s patented technology is the only known solution that can disrupt “program interference” write operation attacks as well as “read disturb” read operation attacks that would attempt to exploit SSD vulnerabilities and corrupt data... Condusiv’s patented write optimization engine (IntelliWrite®) mitigates the first vulnerability, “program interference,” by disrupting the write pattern that would otherwise generate errors and corrupt data... Condusiv’s second patented engine (IntelliMemory®) disrupts the second vulnerability, “read disturb,” by establishing a tier-0 caching strategy that leverages idle, available memory to serve hot reads. This renders the “read disturb” attack useless since the storage target for hot reads becomes memory instead of the SSD device..." http://blog.condusiv.com/post/2017/...ata-Corruption-if-Exploited-by-Attackers.aspx
A corner on that market for sure with this new revelation/discovery, and what a market corner it is. Cannot possibly imagine the shear numbers of SSD's in current operation around the globe.