Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
In a first, researchers extract secret key used to encrypt Intel CPU code
(
arstechnica.com
)
52 points
by
anfilt
on Oct 28, 2020
|
hide
|
past
|
favorite
|
8 comments
brokenmachine
on Oct 29, 2020
|
next
[–]
As I understand it, this allows the researchers to decrypt the microcode but not to sign their own modified microcode, is that correct?
mdaniel
on Oct 28, 2020
|
prev
|
next
[–]
Given a magic wand, I would update the link URL to not take one directly to the comments section
efreak
on Oct 28, 2020
|
parent
|
next
[–]
It's somewhat understandable; on Ars, you can go to comments view and expand the full story, then forget you're actually on the comments.
gpav
on Oct 29, 2020
|
parent
|
prev
|
next
[–]
https://arstechnica.com/gadgets/2020/10/in-a-first-researche...
anfilt
on Oct 28, 2020
|
parent
|
prev
|
next
[–]
Ooops, my bad. Sadly, I can only update the title.
pontifier
on Oct 29, 2020
|
prev
[–]
I seem to recall hearing that some CPUs were hobbled or otherwise limited by software for product diferentiation, but were otherwise identical.
I wonder if this can be used to unlock additional cores or features on some CPUs.
dragosmocrii
on Oct 29, 2020
|
parent
[–]
they are not necessarily identical. however during fabrication, there might be deffects in some cores, so Intel can disable some cores and market it as a lower end product. it is called binning
rasz
on Oct 29, 2020
|
root
|
parent
[–]
binning locking down multiplier change? lets not kid ourselves
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: