diff --git a/guide.md b/guide.md index 8be2770..9fb7c0e 100644 --- a/guide.md +++ b/guide.md @@ -106,7 +106,6 @@ Finally note that this guide does mention and even recommends various commercial - [Your Wi-Fi or Ethernet MAC address:] - [Your Bluetooth MAC address:] - [Your CPU:] - - [Types of Attacks:] - [Your Operating Systems and Apps telemetry services:] - [Your Smart devices in general:] - [Yourself:] @@ -385,6 +384,7 @@ Finally note that this guide does mention and even recommends various commercial - [Appendix B2: Monero Disclaimer] - [Appendix B3: Threat modeling resources] - [Appendix B4: Important notes about evil-maid and tampering] +- [Appendix B5: Types of CPU attacks:] - [References:] # Pre-requisites and limitations: @@ -873,8 +873,6 @@ Check yourself: - If you are using Windows, you can check the vulnerability status of your CPU using inSpectre [[Archive.org]][81] -### Types of Attacks: - Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: [[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability) Transient execution attacks (formerly called speculative execution side channel methods) and select security issues plague many Intel CPUs. Here you can check your CPU against affected micro-processors [[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html). @@ -13745,6 +13743,7 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t [Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer [Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources [Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering + [Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks [References:]: #references [cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/ [27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/