Move content to Appendix B5: Types of CPU attacks

Signed-off-by: pterocles <pterocles@proton.me>
This commit is contained in:
pterocles 2022-08-14 19:39:37 -04:00
parent 1703ae02c8
commit 5cca117aa1
No known key found for this signature in database
GPG Key ID: EEBC61CFA7242C5F

View File

@ -106,7 +106,6 @@ Finally note that this guide does mention and even recommends various commercial
- [Your Wi-Fi or Ethernet MAC address:] - [Your Wi-Fi or Ethernet MAC address:]
- [Your Bluetooth MAC address:] - [Your Bluetooth MAC address:]
- [Your CPU:] - [Your CPU:]
- [Types of Attacks:]
- [Your Operating Systems and Apps telemetry services:] - [Your Operating Systems and Apps telemetry services:]
- [Your Smart devices in general:] - [Your Smart devices in general:]
- [Yourself:] - [Yourself:]
@ -385,6 +384,7 @@ Finally note that this guide does mention and even recommends various commercial
- [Appendix B2: Monero Disclaimer] - [Appendix B2: Monero Disclaimer]
- [Appendix B3: Threat modeling resources] - [Appendix B3: Threat modeling resources]
- [Appendix B4: Important notes about evil-maid and tampering] - [Appendix B4: Important notes about evil-maid and tampering]
- [Appendix B5: Types of CPU attacks:]
- [References:] - [References:]
# Pre-requisites and limitations: # Pre-requisites and limitations:
@ -873,8 +873,6 @@ Check yourself:
- If you are using Windows, you can check the vulnerability status of your CPU using inSpectre <https://www.grc.com/inspectre.htm> <sup>[[Archive.org]][81]</sup> - If you are using Windows, you can check the vulnerability status of your CPU using inSpectre <https://www.grc.com/inspectre.htm> <sup>[[Archive.org]][81]</sup>
### Types of Attacks:
Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability)</sup> <sup>[[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability)</sup> Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability)</sup> <sup>[[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability)</sup>
Transient execution attacks (formerly called speculative execution side channel methods) and select security issues plague many Intel CPUs. Here you can check your CPU against affected micro-processors <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> <sup>[[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html)</sup>. Transient execution attacks (formerly called speculative execution side channel methods) and select security issues plague many Intel CPUs. Here you can check your CPU against affected micro-processors <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> <sup>[[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html)</sup>.
@ -13745,6 +13743,7 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
[Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer [Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer
[Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources [Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources
[Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering [Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering
[Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks
[References:]: #references [References:]: #references
[cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/ [cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/
[27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/ [27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/