this post was submitted on 26 Jul 2023
142 points (100.0% liked)

Technology

37712 readers
171 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

The bug allows attackers to swipe data from a CPU’s registers. […] the exploit doesn’t require physical hardware access and can be triggered by loading JavaScript on a malicious website.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 year ago (1 children)

I suppose that is a good point. look for repeating chunks of data to get hardware encryption keys. However, the main point I want to stress remains that a javascript version is yet to be proven. Cloudflare edited their original statement yesterday from "The attack can even be carried out remotely through JavaScript on a website, meaning that the attacker need not have physical access to the computer or server." to today "While there might be a possibility to execute this attack via the browser on the remote machine it hasn’t been yet demonstrated." https://blog.cloudflare.com/zenbleed-vulnerability/

This was the main piece of misinformation I wanted to dispel. It is still up in the air whether regular people with home computers need to be panicking. Thank you for also pointing out that this isn't primarily targeting passwords "typed by users."

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago) (1 children)

The JavaScript vector is a reasonable extrapolation based on how similar attacks like Meltdown, Spectre, or Heartbleed, eventually got their JavaScript exploits. There may not be one yet, but there's likely to be one at some point.

It is still up in the air whether regular people with home computers need to be panicking.

That one's easy: no, they don't.

Even if an attacker were to get the disk encryption key from a regular user through some malicious JavaScript, the chances of them being able to actually exploit it, are slim to none. They'd still need some extra way to use that key, which would require a separate exploit, or physical access.

If it were a company computer, or the user got personally targeted (espionage, trade secrets, law enforcement, etc.)... then maybe worry a bit.

Hosting providers with shared servers, need to panic a lot. Anyone running a public server, be it at a provider or at home, should also panic a bit.