Please keep in mind that this website is a furry blog, first and foremost, that sometimes happens to cover security and cryptography topics.

Many people have, over the years, assumed the opposite and commented accordingly. The ensuing message board threads are usually is a waste of time and energy for everyone involved. So please adjust your expectations.

Stop playing mind games.

@Hyolobrika
Impossible! I suppose that's the whole point of his blog.
I highly doubt that the side-channel he mentions is exploitable in real-world conditions on a server with dozens of users where each request might be handled by a different processor core — and that's exactly what Matrix dev told him.

@m0xee What makes you think every Matrix server will have dozens of users and multiple cores?

@Hyolobrika
Well, in that case it would most probably be hosted on a VPS blurring the concept of what CPU is and rendering such side channel attacks inefficient.
People are too much into timed cache attacks ever since Spectre made it a hot topic, despite this type of attacks existing since the Pentium Pro days.

Follow

@Hyolobrika
I'm fairly certain that a lot of hardware is still running without any mitigations at all to achieve higher performance, and yet… No real world consequences, nothing big enough to make the news 🤷

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml