<div dir="ltr">Local exploit that with frameworks like WebAssembly might be exploitable through your browser. Use uMatrix & Firefox/Chrome or Brave browser with JS disabled by default on places you don't trust.<br></div><br><div class="gmail_quote"><div dir="ltr">On Tue, Jan 16, 2018 at 4:00 PM Khalid Baheyeldin <<a href="mailto:kb@2bits.com">kb@2bits.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Remember that Meltdown is a LOCAL exploit.<br>
That means that someone is able to execute unauthorized code on your machine.<br>
<br>
On desktops and dedicated servers, this is less of a concern, since it<br>
is game over already if someone is able to execute code locally.<br>
<br>
On virtualized machines, this is a big concern. Data can be leaked by<br>
other instances active on the same physical server. So companies<br>
operating virtual servers are concerned about this.<br>
<br>
AMD's vulnerability (Spectre) is less severe than Meltdown, and their<br>
latest generation of CPUs caught up to Intel in terms of performance<br>
and cost as well.<br>
<br>
I will consider them in future purchases.<br>
<br>
_______________________________________________<br>
kwlug-disc mailing list<br>
<a href="mailto:kwlug-disc@kwlug.org" target="_blank">kwlug-disc@kwlug.org</a><br>
<a href="http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org" rel="noreferrer" target="_blank">http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org</a><br>
</blockquote></div>