Comment Oh lord who cares (Score 1) 85
Both attacks use a small piece of hardware, known as an interposer, that sits between CPU silicon and the memory module.
Yeah, I got bad news, if someone is able to get access to your hardware for long enough to install an interposer AND get it to work (the signal integrity engineering at modern RAM speeds borders on magic, and an interposer throws God* only knows how many nanohenries of mutual inductance wrenches into the machinery), they've got time to do a LOT of things.
*and by God I mean the million-dollar FDTD simulation engines
Yeah, I got bad news, if someone is able to get access to your hardware for long enough to install an interposer AND get it to work (the signal integrity engineering at modern RAM speeds borders on magic, and an interposer throws God* only knows how many nanohenries of mutual inductance wrenches into the machinery), they've got time to do a LOT of things.
*and by God I mean the million-dollar FDTD simulation engines