@Suiseiseki Eh, that'd be obnoxious but... I could live with that.
I wouldn't be worrying about when finally one exploit will break the chips sufficiently that even without hyperthreading I'm vulnerable. > attacks seem to only be a problem if you're running proprietary malware on your computer - if you don't do that, you're pretty safe. That's really only true if no software you use has RCE vulnerabilities (a rather tall order to ensure).
(Malicious Free Software is rare but also exists.)
@Suiseiseki Honestly at this point I think we should seriously consider whether the performance improvement is really worth the constant security & correctness issues.
That latter paragraph sounds interesting but I lack the knowledge to really have any meaningful opinion on it.
Not particularly knowledgeable in #hardware matters, but why are we using the seemingly extremely brittle branch-prediction instead of delay slots which seem not to have those issues?
When one starts abusing those mechanics much at all, the validity of any consent given under it is at least as suspect as that given by someone drugged prior.
Much the same reason why hyperthreading can be considered safe if you've set the hypervisor to only schedule threads from the same VM on shared cores and that you consider individual VMs to be the trust boundaries. Then, even with all known exploitation methods available, no breach of the trust boundary happens.
@clacke@brewsterkahle@spamvictim > digital lending is a potential threat to their business "That's quite unfortunate but I don't see how your choice of a failed business model is society's problem."
@jeffcliff@Suiseiseki I'd think that references the management engines (ayyy minix forks) rather.
And outside of painfully expensive whitebox hardware like the Talos II, it's true that modern workstations & computers generally won't run without proprietary software.
@lanodan@chjara Proprietary, mostly out of what I suspect to be hierarchical compromise.
https://www.gnu.org/proprietary/malware-appliances.html This page makes no requirement of proprietary software (or software at all going by the reprogrammable check and several of the entries having no software per the check) and according to the listing at the top is within a root about /malware .
Presumably Stallman & the rest of GNU find the notion of full permutation generation of such roots into URIs gnarly.
@lanodan@chjara That'd still fit under the malware listings though.
The malware listing root on gnu.org (https://www.gnu.org/proprietary/proprietary.html) does quite plainly state "Software designed to function in a way that mistreats the user is called malware.".
@erincandescent@rysertio@lanodan@tek > only for it to promptly be seized because their counterparty was a fraudster and the funds were a proceed of crime (that they just helped money launder) Isn't that mainly a problem for those that provide no anonymization whatsoever (which yes is most of them save for like... 3 privacy coins)?
@screwtape@technotramp I'm not particularly fond of web3 as a term as it is largely associated with grifting.
Distributed p2p technologies outright predate widespread adoption of web1.0, so naming a web version for that (while having little to do with the web) seems a bit weird.
As for Javascript, the main issue is that it is typically used to run arbitrary proprietary code in one's browser, and additionally that its presence in the browser makes compartmentalization harder than it should be.