• 17 Posts
  • 1.33K Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle












  • I wish it were that easy, there’s a lot of shared architecture in CPU design. So maybe there’s cache lines that are shared, those have to be disabled.

    Architecturally, maybe memory tagging for cash lines that in addition to looking at the TLB and physical addresses also looks at memory spaces. So if you’re addressing something that’s in the cache Even for another complete processor, you have to take the full hit going out to main memory.

    But even then it’s not perfect, because if you’re invalidating the cache of another core there is going to be some memory penalty, probably infotesimal compared to going to main memory, but it might be measurable. I’m almost certain it would be measurable. So still a side channel attack

    One mitigation that does come to mind, is running each program in a virtual machine, that way it’s guaranteed to have completely different physical address space. This is really heavy-handed, and I have seen some papers about the side channel attacks getting leaked information from co guest VMs in AWS. But it certainly reduces the risk surface









  • They have a freezer INSIDE their heated house, I know it’s convenient, but the engineer in me gets annoyed when I see that.

    maybe we as a society could standardize fridge sizes so we could build fridges that open on the inside but radiate on the outside

    Same for heat sources being inside a AC house (oven, fridge, etc) outdoor kitchens make so much sense, or even garage fridges

    im sad she hasn’t posted a new video in a year.