RSS 생중계
Denmark Postal Service To Stop Delivering Letters
Read more of this story at Slashdot.
Slashdot Asks: What's the Most Influential Video Game of All Time?
Read more of this story at Slashdot.
Ryanair Delays Move To Paperless Boarding Passes
Read more of this story at Slashdot.
NASA is Making Sacrifices To Keep the Voyager Mission Alive
Read more of this story at Slashdot.
US Congressional Panel Urges Americans To Ditch China-made Routers
Read more of this story at Slashdot.
A Quarter of Startups in YC's Current Cohort Have Codebases That Are Almost Entirely AI-Generated
Read more of this story at Slashdot.
[$] Timer IDs, CRIU, and ABI challenges
Security updates for Thursday
China To Publish Policy To Boost RISC-V Chip Use Nationwide
Read more of this story at Slashdot.
Eric Schmidt Argues Against a 'Manhattan Project for AGI'
Read more of this story at Slashdot.
India Grants Tax Officials Sweeping Digital Access Powers
Read more of this story at Slashdot.
Goldman Sachs: Why AI Spending Is Not Boosting GDP
Read more of this story at Slashdot.
Utah Passes First US App Store Age Verification Law
Read more of this story at Slashdot.
Amazon Tests AI Dubbing on Prime Video Movies, Series
Read more of this story at Slashdot.
[$] LWN.net Weekly Edition for March 6, 2025
- Front: Firefox forks; Bend and Vine; FineIBT; Guard pages; Fedora's Flatpak packaging; Zotero.
- Briefs: LFS 12.3; FerretDB 2.0; Firefox; Fish 4.0; Incus 6.10; Thunderbird 136.0; Xen 4.20; Quotes; ...
- Announcements: Newsletters, conferences, security updates, patches, and more.
Google is Adding More AI Overviews and a New 'AI Mode' To Search
Read more of this story at Slashdot.
Zen and the Art of Microcode Hacking (Google Bug Hunters)
Secure hash functions are designed in such a way that there is no secret key, and there is no way to use knowledge of the intermediate state in order to generate a collision. However, CMAC was not designed as a hash function, and therefore it is a weak hash function against an adversary who has the key. Remember that every AMD Zen CPU has to have the same AES-CMAC key in order to successfully calculate the hash of the AMD public key and the microcode patch contents. Therefore, the key only needs to be revealed from a single CPU in order to compromise all other CPUs using the same key. This opens up the potential for hardware attacks (e.g., reading the key from ROM with a scanning electron microscope), side-channel attacks (e.g., using Correlation Power Analysis to leak the key during validation), or other software or hardware attacks that can somehow reveal the key. In summary, it is a safe assumption that such a key will not remain secret forever.
Europe on Alert Over Suspected Sabotage of Undersea Cables
Read more of this story at Slashdot.
Nintendo Says Latest Legal Win Against Piracy 'Significant' For 'Entire Games Industry'
Read more of this story at Slashdot.
Could New Clocks Keep Airplanes Safe From GPS Jamming?
Read more of this story at Slashdot.
페이지
