mirror of
https://github.com/Anon-Planet/thgtoa.git
synced 2024-10-01 01:25:56 -04:00
Move content to Appendix B5: Types of CPU attacks
Signed-off-by: pterocles <pterocles@proton.me>
This commit is contained in:
parent
1703ae02c8
commit
5cca117aa1
5
guide.md
5
guide.md
@ -106,7 +106,6 @@ Finally note that this guide does mention and even recommends various commercial
|
|||||||
- [Your Wi-Fi or Ethernet MAC address:]
|
- [Your Wi-Fi or Ethernet MAC address:]
|
||||||
- [Your Bluetooth MAC address:]
|
- [Your Bluetooth MAC address:]
|
||||||
- [Your CPU:]
|
- [Your CPU:]
|
||||||
- [Types of Attacks:]
|
|
||||||
- [Your Operating Systems and Apps telemetry services:]
|
- [Your Operating Systems and Apps telemetry services:]
|
||||||
- [Your Smart devices in general:]
|
- [Your Smart devices in general:]
|
||||||
- [Yourself:]
|
- [Yourself:]
|
||||||
@ -385,6 +384,7 @@ Finally note that this guide does mention and even recommends various commercial
|
|||||||
- [Appendix B2: Monero Disclaimer]
|
- [Appendix B2: Monero Disclaimer]
|
||||||
- [Appendix B3: Threat modeling resources]
|
- [Appendix B3: Threat modeling resources]
|
||||||
- [Appendix B4: Important notes about evil-maid and tampering]
|
- [Appendix B4: Important notes about evil-maid and tampering]
|
||||||
|
- [Appendix B5: Types of CPU attacks:]
|
||||||
- [References:]
|
- [References:]
|
||||||
|
|
||||||
# Pre-requisites and limitations:
|
# Pre-requisites and limitations:
|
||||||
@ -873,8 +873,6 @@ Check yourself:
|
|||||||
|
|
||||||
- If you are using Windows, you can check the vulnerability status of your CPU using inSpectre <https://www.grc.com/inspectre.htm> <sup>[[Archive.org]][81]</sup>
|
- If you are using Windows, you can check the vulnerability status of your CPU using inSpectre <https://www.grc.com/inspectre.htm> <sup>[[Archive.org]][81]</sup>
|
||||||
|
|
||||||
### Types of Attacks:
|
|
||||||
|
|
||||||
Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability)</sup> <sup>[[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability)</sup>
|
Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability)</sup> <sup>[[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability)</sup>
|
||||||
|
|
||||||
Transient execution attacks (formerly called speculative execution side channel methods) and select security issues plague many Intel CPUs. Here you can check your CPU against affected micro-processors <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> <sup>[[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html)</sup>.
|
Transient execution attacks (formerly called speculative execution side channel methods) and select security issues plague many Intel CPUs. Here you can check your CPU against affected micro-processors <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> <sup>[[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html)</sup>.
|
||||||
@ -13745,6 +13743,7 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
|||||||
[Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer
|
[Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer
|
||||||
[Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources
|
[Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources
|
||||||
[Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering
|
[Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering
|
||||||
|
[Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks
|
||||||
[References:]: #references
|
[References:]: #references
|
||||||
[cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/
|
[cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/
|
||||||
[27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/
|
[27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/
|
||||||
|
Loading…
Reference in New Issue
Block a user