• GlitterInfection@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 years ago

    This requires local access to do and presently an hour or two of uninterrupted processing time on the same cpu as the encryption algorithm.

    So if you’re like me, using an M-chip based device, you don’t currently have to worry about this, and may never have to.

    On the other hand, the thing you have to worry about has not been patched out of nearly any algorithm:

    https://xkcd.com/538/

    • mox@lemmy.sdf.orgOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 years ago

      The second comment on the page sums up what I was going to point out:

      I’d be careful making assumptions like this ; the same was true of exploits like Spectre until people managed to get it efficiently running in Javascript in a browser (which did not take very long after the spectre paper was released). Don’t assume that because the initial PoC is time consuming and requires a bunch of access that it won’t be refined into something much less demanding in short order.

      Let’s not panic, but let’s not get complacent, either.

      • linearchaos@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 years ago

        I mean, unpatchable vulnerability. Complacent, uncomplacent, I’m not real sure they look different.

        • booly@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          Can’t fix the vulnerability, but can mitigate by preventing other code from exploiting the vulnerability in a useful way.

        • brbposting@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 years ago

          No way! Even the evil ones will try to avoid jail.

          Meanwhile they might have a friggin budget for the GrayKey, the Stingray

          Definitely believe rights are more likely to be violated when they can just plug in or power on without getting their gloves dirty.

  • Spedwell@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 years ago

    Wow, what a dishearteningly predictable attack.

    I have studied computer architecture and hardware security at the graduate level—though I am far from an expert. That said, any student in the classroom could have laid out the theoretical weaknesses in a “data memory-dependent prefetcher”.

    My gut says (based on my own experience having a conversation like this) the engineers knew there was a “information leak” but management did not take it seriously. It’s hard to convince someone without a cryptographic background why you need to {redesign/add a workaround/use a lower performance design} because of “leaks”. If you can’t demonstrate an attack they will assume the issue isn’t exploitable.

    • Killing_Spark@feddit.de
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 years ago

      So the attack is (very basically, if I understand correctly)

      Setup:

      • I control at least one process on the machine I am targeting another process on
      • I can send data to the target process and the process will decrypt that

      Attack:

      • I send data that in some intermediate state of decryption will look like a pointer
      • This “pointer” contains some information about the secret key I am trying to steal
      • The prefetcher does it’s thing loading the data “pointed to” in the cache
      • I can observe via a cache side channel what the prefetcher did, giving me this “pointer” containing information about the secret key
      • Repeat until I have gathered enough information about the secret key

      Is this somewhat correct? Those speculative execution vulnerabilities always make my brain hurt a little

    • lightnegative@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 years ago

      If you can’t demonstrate an attack they will assume the issue isn’t exploitable.

      Absolutely. Theory doesn’t always equal reality. The security guys submitting CVE’s to pad their resumes should absolutely be required to submit a working exploit. If they can’t then they’re just making needless noise

    • TechNerdWizard42@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      2 years ago

      The more probable answer is that the NSA asked for the backdoor to be left in. They do all the time, it’s public knowledge at this point. AMD and Intel chips have the requisite backdoors by design, and so does Apple. The Chinese and Russian designed chips using the same architecture models, do not. Hmmmm… They have other backdoors of course.

      It’s all about security theatre for the public but decrypted data for large organizational consumption.

      • Spedwell@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 years ago

        I don’t believe that explanation is more probable. If the NSA had the power to compell Apple to place a backdoor in their chip, it would probably be a proper backdoor. It wouldn’t be a side channel in the cache that is exploitable only in specific conditions.

        The exploit page mentions that the Intel DMP is robust because it is more selective. So this is likely just a simple design error of making the system a little too trigger-happy.

        • TechNerdWizard42@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          They do have the power and they do compel US companies to do exactly this. When discovered publicly they usually limit it to the first level of the “vulnerability” until more is discovered later.

          It is not conjecture, there is leaked documents that prove it. And anyone who works in semiconductor design (cough cough) is very much aware.

      • BreakDecks@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 years ago

        No system is perfect, sure, but rolling their own silicon was sorta asking for this problem.

        • hansl@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 years ago

          As opposed to what? Samsung, Intel, AMD and NVIDIA and others are also “rolling their own silicon”. If a vulnerability like that was found in intel it would be much more problematic.

          • booly@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 years ago

            This particular class of vulnerabilities, where modern processors try to predict what operations might come next and perform them before they’re actually needed, has been found in basically all modern CPUs/GPUs. Spectre/Meldown, Downfall, Retbleed, etc., are all a class of hardware vulnerabilities that can leak crypographic secrets. Patching them generally slows down performance considerably, because the actual hardware vulnerability can’t be fixed directly.

            It’s not even the first one for the Apple M-series chips. PACMAN was a vulnerability in M1 chips.

            Researchers will almost certainly continue to find these, in all major vendors’ CPUs.

              • KairuByte@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 years ago

                The patch for meltdown results in a performance hit of between 2% and 20%. It’s hard to pin down an exact number because it varies both by CPU and use case.

          • Dashmezzo@lemm.ee
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            2 years ago

            Also the article states it is found in intels chips too. So not really any better if they had stayed on that pathway either

            • NeatNit@discuss.tchncs.de
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 years ago

              I’ve just finished reading the article, it does not say this. It says Intel also has a DMP but that only Apple’s version has the vulnerability.

  • intensely_human@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 years ago

    So does this mean it’s being actively exploited by people? How screwed is the average person over this?

  • Zink@pawb.social
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    2 years ago

    A revolution in composition. First titanium (making phones somehow less durable), and now they can’t even keep their own chips secure because of the composition of the chip lol

  • n3m37h@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    2
    ·
    2 years ago

    Considering how bad apple programmers are I am not surprised. I created an apple account just so I can get apple tv. Sadly I made the account on tv.apple.com and didn’t make a 2fa so now I can not log into appleid.apple.com or iCloud.com or into my Apple 4k+

    This happened this week…

    • Bezier@suppo.fi
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      I somehow doubt they have the same people building online apps and the designing processors.