[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
X86 dispatch contention vulnerability
On Wed, 14 Nov 2018 21:15:29 +0000 (UTC)
jim bell <jdb10987 at yahoo.com> wrote:
me >>  IIRC you also worked for intel designing memory chips? Excuse my rather naive question but...Did you see/hear at that time any hints that chips were being tampered with or somehow backdooored because of 'national security'?Â
> I didn't design memory chips. I was a "product engineer" for a specific self-refreshing dynamic RAM
I guess I didn't recall correctly then =P . I must have assumed that product engineer more or less meant designer.
Â
> In fact, I was the first person at Intel, and perhaps in the world, who saw the flash(es) through the microscope of the as-being-blown fuses on these chips. Intel was doing this redundancy before anyone else, I believe.Â
Interesting. I thought that sort of patching was something relatively new only done to the chips in sdcards and the like. I guess it's not new.
> I was never in a position to hear if chips could be "backdoored". Â
Oh well. Thanks for the engineering details and info anyway =)
> Â Â Â Â Â Â Jim Bell
>
>
>
>
>