• 4 Posts
  • 1.66K Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle

  • All their beef is clean. My guess is you’ve been eating good food for the 10 years, McDonald’s is not very good, all of the extra sauces, carbs, bread, can be executed poorly and give you a bad experience. Especially the wilted lettuce they love.

    It’s like not having a Coke for 6 months, then drinking one, it’s sicklingly sweet and taste really bad. But if you drink it for a few days, suddenly it tastes really good


















  • I wish it were that easy, there’s a lot of shared architecture in CPU design. So maybe there’s cache lines that are shared, those have to be disabled.

    Architecturally, maybe memory tagging for cash lines that in addition to looking at the TLB and physical addresses also looks at memory spaces. So if you’re addressing something that’s in the cache Even for another complete processor, you have to take the full hit going out to main memory.

    But even then it’s not perfect, because if you’re invalidating the cache of another core there is going to be some memory penalty, probably infotesimal compared to going to main memory, but it might be measurable. I’m almost certain it would be measurable. So still a side channel attack

    One mitigation that does come to mind, is running each program in a virtual machine, that way it’s guaranteed to have completely different physical address space. This is really heavy-handed, and I have seen some papers about the side channel attacks getting leaked information from co guest VMs in AWS. But it certainly reduces the risk surface