schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

8
active users

#speculativeexecution

0 posts0 participants0 posts today
IT News<p>This Week in Security: DeepSeek’s Oopsie, AI Tarpits, And Apple’s Leaks - DeepSeek has captured the world’s attention this week, with an unexpected release ... - <a href="https://hackaday.com/2025/01/31/this-week-in-security-deepseeks-oopsie-ai-tarpits-and-apples-leaks/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/31/this-w</span><span class="invisible">eek-in-security-deepseeks-oopsie-ai-tarpits-and-apples-leaks/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/deepseek" class="mention hashtag" rel="tag">#<span>deepseek</span></a> <a href="https://schleuss.online/tags/tarpits" class="mention hashtag" rel="tag">#<span>tarpits</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="tag">#<span>news</span></a></p>
IT News<p>Apple chips can be hacked to leak secrets from Gmail, iCloud, and more - Apple-designed chips powering Macs, iPhones, and iPads contain two newly d... - <a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/a" class="mention hashtag" rel="tag">#<span>a</span></a>-serieschips <a href="https://schleuss.online/tags/m" class="mention hashtag" rel="tag">#<span>m</span></a>-serieschips <a href="https://schleuss.online/tags/sidechannels" class="mention hashtag" rel="tag">#<span>sidechannels</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="tag">#<span>apple</span></a></p>
ITSEC News<p>Zenbleed: How the quest for CPU performance could put your passwords at risk - Parse this! &quot;You need to turn on a special setting to stop the code you wrote to stop the... <a href="https://nakedsecurity.sophos.com/2023/07/26/zenbleed-how-the-quest-for-cpu-performance-could-put-your-passwords-at-risk/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">nakedsecurity.sophos.com/2023/</span><span class="invisible">07/26/zenbleed-how-the-quest-for-cpu-performance-could-put-your-passwords-at-risk/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a>-2023-20593 <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="tag">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/zenbleed" class="mention hashtag" rel="tag">#<span>zenbleed</span></a> <a href="https://schleuss.online/tags/ormandy" class="mention hashtag" rel="tag">#<span>ormandy</span></a> <a href="https://schleuss.online/tags/amd" class="mention hashtag" rel="tag">#<span>amd</span></a></p>
IT News<p>This Week in Security: Session Puzzling, Session Keys, and Speculation - Last week we briefly mentioned a vulnerability in the Papercut software, and more ... - <a href="https://hackaday.com/2023/04/28/this-week-in-security-session-puzzling-session-keys-and-speculation/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/04/28/this-w</span><span class="invisible">eek-in-security-session-puzzling-session-keys-and-speculation/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="tag">#<span>news</span></a> <a href="https://schleuss.online/tags/rdp" class="mention hashtag" rel="tag">#<span>rdp</span></a></p>
IT News<p>New working speculative execution attack sends Intel and AMD scrambling - Enlarge </p><p>Some microprocessors from Intel and AMD are vulnerabl... - <a href="https://arstechnica.com/?p=1865795" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1865795</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/cpus" class="mention hashtag" rel="tag">#<span>cpus</span></a> <a href="https://schleuss.online/tags/amd" class="mention hashtag" rel="tag">#<span>amd</span></a></p>
IT News<p>New Spectre attack once again sends Intel and AMD scrambling for a fix - Enlarge (credit: Intel) <br />Since 2018, an almost endless series of attacks broadly... - <a href="https://arstechnica.com/?p=1762393" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1762393</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/centralprocessingunit" class="mention hashtag" rel="tag">#<span>centralprocessingunit</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="tag">#<span>tech</span></a> <a href="https://schleuss.online/tags/cpus" class="mention hashtag" rel="tag">#<span>cpus</span></a></p>
IT News<p>Undocumented x86 Instructions Allow Microcode Access - For an old CPU, finding all the valid instructions wasn’t very hard. You simply tried them all. Sure... - <a href="https://hackaday.com/2021/03/26/undocumented-x86-instructions-allow-microcode-access/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2021/03/26/undocu</span><span class="invisible">mented-x86-instructions-allow-microcode-access/</span></a> <a href="https://schleuss.online/tags/undocumentedinstructions" class="mention hashtag" rel="tag">#<span>undocumentedinstructions</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/computerhacks" class="mention hashtag" rel="tag">#<span>computerhacks</span></a> <a href="https://schleuss.online/tags/softwarehacks" class="mention hashtag" rel="tag">#<span>softwarehacks</span></a> <a href="https://schleuss.online/tags/microcode" class="mention hashtag" rel="tag">#<span>microcode</span></a> <a href="https://schleuss.online/tags/x86" class="mention hashtag" rel="tag">#<span>x86</span></a></p>
ITSEC News<p>AMD Downplays CPU Threat Opening Chips to Data Leak Attacks - New side-channel attacks have been disclosed in AMD CPUs, however AMD said that they are not new. more: <a href="https://threatpost.com/amd-downplays-cpu-threat-opening-chips-to-data-leak-attacks/153516/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/amd-downplays-c</span><span class="invisible">pu-threat-opening-chips-to-data-leak-attacks/153516/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/sidechannelflaw" class="mention hashtag" rel="tag">#<span>sidechannelflaw</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="tag">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/zombieload" class="mention hashtag" rel="tag">#<span>zombieload</span></a> <a href="https://schleuss.online/tags/l1dcache" class="mention hashtag" rel="tag">#<span>l1dcache</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/takeaway" class="mention hashtag" rel="tag">#<span>takeaway</span></a> <a href="https://schleuss.online/tags/amdchip" class="mention hashtag" rel="tag">#<span>amdchip</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="tag">#<span>hacks</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/amd" class="mention hashtag" rel="tag">#<span>amd</span></a></p>
IT News<p>Sushi Roll Helps Inspect Your CPU Internals - [Gamozolabs’] post about Sushi Roll — a research kernel for monitoring Intel CPU internals — is pr... more: <a href="https://hackaday.com/2019/08/21/sushi-roll-helps-inspect-your-cpu-internals/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2019/08/21/sushi-</span><span class="invisible">roll-helps-inspect-your-cpu-internals/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/cpuarchitecture" class="mention hashtag" rel="tag">#<span>cpuarchitecture</span></a> <a href="https://schleuss.online/tags/computerhacks" class="mention hashtag" rel="tag">#<span>computerhacks</span></a> <a href="https://schleuss.online/tags/pentium" class="mention hashtag" rel="tag">#<span>pentium</span></a> <a href="https://schleuss.online/tags/cache" class="mention hashtag" rel="tag">#<span>cache</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a></p>
IT News<p>Silent Windows update patched side channel that leaked data from Intel CPUs - Enlarge / An uncovered Intel Core i5-3210M (BGA) inside of a laptop. (credit: Köf3) <br />Microsoft las... more: <a href="https://arstechnica.com/?p=1547147" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1547147</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sidechannel" class="mention hashtag" rel="tag">#<span>sidechannel</span></a> <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="tag">#<span>exploits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/cpus" class="mention hashtag" rel="tag">#<span>cpus</span></a></p>
ClaudioM<p>Alright sir.... 😕 <a href="https://mastodon.xyz/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.xyz/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://mastodon.xyz/tags/mitigations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mitigations</span></a></p><p><a href="https://make-linux-fast-again.com/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">make-linux-fast-again.com/</span><span class="invisible"></span></a></p>
ITSEC News<p>Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws - A lot of thought and meaning goes into the naming of infamous CPU side channel flaws, like ZombieL... more: <a href="https://threatpost.com/behind-the-naming-of-zombieload-and-other-intel-spectre-like-flaws/144875/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/behind-the-nami</span><span class="invisible">ng-of-zombieload-and-other-intel-spectre-like-flaws/144875/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sidechannelflaw" class="mention hashtag" rel="tag">#<span>sidechannelflaw</span></a> <a href="https://schleuss.online/tags/zombieload" class="mention hashtag" rel="tag">#<span>zombieload</span></a> <a href="https://schleuss.online/tags/cpuattack" class="mention hashtag" rel="tag">#<span>cpuattack</span></a> <a href="https://schleuss.online/tags/intelcpu" class="mention hashtag" rel="tag">#<span>intelcpu</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/fallout" class="mention hashtag" rel="tag">#<span>fallout</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="tag">#<span>hacks</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a></p>
ITSEC News<p>Intel ZombieLoad Side-Channel Attack: 10 Takeaways - Here are 10 top takeaways from Intel&#39;s most recent class of Spectre-like speculative execution vul... more: <a href="https://threatpost.com/intel-zombieload-side-channel-attack-10-takeaways/144771/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/intel-zombieloa</span><span class="invisible">d-side-channel-attack-10-takeaways/144771/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/intelvulnerability" class="mention hashtag" rel="tag">#<span>intelvulnerability</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/side" class="mention hashtag" rel="tag">#<span>side</span></a>-channel <a href="https://schleuss.online/tags/intelattack" class="mention hashtag" rel="tag">#<span>intelattack</span></a> <a href="https://schleuss.online/tags/zombieload" class="mention hashtag" rel="tag">#<span>zombieload</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="tag">#<span>hacks</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a></p>
IT News<p>New speculative execution bug leaks data from Intel chips’ internal buffers - First disclosed in January 2018, the Meltdown and Spectre attacks have opened the floodgates... more: <a href="https://arstechnica.com/?p=1504973" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1504973</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="tag">#<span>tech</span></a></p>
ITSEC News<p>Intel CPUs Impacted By New Class of Spectre-Like Attacks - Intel has disclosed a new class of speculative execution side channel attacks. more: <a href="https://threatpost.com/intel-cpus-impacted-by-new-class-of-spectre-like-attacks/144728/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/intel-cpus-impa</span><span class="invisible">cted-by-new-class-of-spectre-like-attacks/144728/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/side" class="mention hashtag" rel="tag">#<span>side</span></a>-channelattack <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/zombieload" class="mention hashtag" rel="tag">#<span>zombieload</span></a> <a href="https://schleuss.online/tags/intelcpu" class="mention hashtag" rel="tag">#<span>intelcpu</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="tag">#<span>hacks</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a></p>
IT News<p>Spoiler, Use-After-Free, and Ghidra: This Week in Computer Security - The past few days have been busy if you’re trying to keep up with the pace of computer security ne... more: <a href="https://hackaday.com/2019/03/13/spoiler-use-after-free-and-ghidra-this-week-in-computer-security/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2019/03/13/spoile</span><span class="invisible">r-use-after-free-and-ghidra-this-week-in-computer-security/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/computersecurity" class="mention hashtag" rel="tag">#<span>computersecurity</span></a> <a href="https://schleuss.online/tags/free" class="mention hashtag" rel="tag">#<span>free</span></a>-after-use <a href="https://schleuss.online/tags/currentevents" class="mention hashtag" rel="tag">#<span>currentevents</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/originalart" class="mention hashtag" rel="tag">#<span>originalart</span></a> <a href="https://schleuss.online/tags/rowhammer" class="mention hashtag" rel="tag">#<span>rowhammer</span></a> <a href="https://schleuss.online/tags/featured" class="mention hashtag" rel="tag">#<span>featured</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/spoiler" class="mention hashtag" rel="tag">#<span>spoiler</span></a> <a href="https://schleuss.online/tags/ghidra" class="mention hashtag" rel="tag">#<span>ghidra</span></a> <a href="https://schleuss.online/tags/nsa" class="mention hashtag" rel="tag">#<span>nsa</span></a></p>
ITSEC News<p>RSAC 2019: Picking Apart the Foreshadow Attack - Raoul Strackx, one of the researchers who discovered the Foreshadow speculative execution vulnerab... more: <a href="https://threatpost.com/foreshadow-attack/142299/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/foreshadow-atta</span><span class="invisible">ck/142299/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/foreshadow" class="mention hashtag" rel="tag">#<span>foreshadow</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/rsa2019" class="mention hashtag" rel="tag">#<span>rsa2019</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="tag">#<span>hacks</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/patch" class="mention hashtag" rel="tag">#<span>patch</span></a> <a href="https://schleuss.online/tags/rsac" class="mention hashtag" rel="tag">#<span>rsac</span></a></p>
IT News<p>Google: Software is never going to be able to fix Spectre-type bugs - Enlarge (credit: Aurich Lawson / Getty Images) <br />Researchers from Google investigating the scope an... more: <a href="https://arstechnica.com/?p=1462619" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1462619</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/processors" class="mention hashtag" rel="tag">#<span>processors</span></a> <a href="https://schleuss.online/tags/meltdown" class="mention hashtag" rel="tag">#<span>meltdown</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="tag">#<span>spectre</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="tag">#<span>google</span></a> <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="tag">#<span>intel</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="tag">#<span>tech</span></a> <a href="https://schleuss.online/tags/amd" class="mention hashtag" rel="tag">#<span>amd</span></a> <a href="https://schleuss.online/tags/x86" class="mention hashtag" rel="tag">#<span>x86</span></a></p>