
Episode 369: Another Pass at Bypass
We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound.
May 23, 201844m 43s
Audio is streamed directly from the publisher (aphid.fireside.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound.
Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.
Sponsored By:
- Digital Ocean: Apply our promo snapocean after you create your account, and get a $10 credit. Promo Code: snapocean
- iXSystems: Get a system purpose built for you. Promo Code: Tell them we sent you!
- Ting: Save $25 off a device, or get $25 in service credits! Promo Code: Visit techsnap.ting.com
Links:
- Security Flaw Impacts Electron-Based Apps
- Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news
- Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext
- Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news
- Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register
- Speculative Store Bypass explained: what it is, how it works
- TechSNAP Episode 351: Performance Meltdown
- Dave's Users flip the switch!
- Dave's War Story is really Screwy!
- Egon's Adventures in misslabled VMs