Hacker News new | comments | show | ask | jobs | submit login
Analyzing potential bounds check bypass vulnerabilities [pdf] (intel.com)
17 points by mobilio 70 days ago | hide | past | web | favorite | 2 comments



Interesting. Intel now says that security must be implemented in software instead of hardware.


They've always said that to cover their asses from massive litigation costs. It could kill them.

Everybody knows that they are lying.




Applications are open for YC Winter 2019

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: