![]() ![]() This didn’t happen just on one CPU family, but almost on all of them. A huge number of benchmarks reported that after applying the new Intel’s microcode, along with other kernel-side fixes, Intel’s CPUs performance went down by 10-30%. The other aspect of the previous security issues was performance. They can only be fully-fixed by buying the most recent CPUs, which wasn’t even an option for me (Remember that I was searching for an on-budget laptop). ![]() The other issue was that a lot of those vulnerabilities remain unfixed, because they are in the design of the CPUs their selves. I have no idea how the security team at Intel could’ve cared less for such serious issues and problems. It took them a long time to release their patches, and even when they did, according to Linus Torvalds, they were “utter garbage”. What was more concerning and enraging for me while I was following the news at that time, was the lack of responsiveness from Intel’s side. You can check the number of discovered security vulnerabilities in 2018-2019 for both Intel and AMD, and notice the huge difference in numbers between the two (While I acknowledge that a lot of Intel’s issues were software, the number of hardware-only vulnerabilities remains bigger, also notice that most of AMD’s page is saying that those issues do not affect their products, such as Fallout, RIDL, ZombieLoad, Spolier, TLPBleed and others, they only affect Intel). A quick research showed me that most of those vulnerabilities affected Intel CPUs, and few of them affected AMD’s products. One of the biggest security stories of the last year, as well as this year, was the discovery of the Spectre and Meltdown vulnerabilities, which were followed by a huge series of other side-channel vulnerabilities. Security Dell Inspiron 3585, my new laptop, fully powered by AMD. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |