Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Bear in mind Apple’s own mobile CPUs were also vulnerable to these attacks. The vulnerability was with commonly used architectural features found in many processor designs from different design houses, including both Apple and Intel among others.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: