Notes from the Intelpocalypse
Notes from the Intelpocalypse
Posted Jan 4, 2018 11:36 UTC (Thu) by nix (subscriber, #2304)In reply to: Notes from the Intelpocalypse by kentonv
Parent article: Notes from the Intelpocalypse
Posted Jan 4, 2018 19:40 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (5 responses)
Posted Jan 4, 2018 20:19 UTC (Thu)
by bronson (subscriber, #4806)
[Link] (4 responses)
(In addition to being extremely well known for crypto timing attacks, it's how LIGO can measure 1/1000th of the width of a proton.)
Posted Jan 4, 2018 20:37 UTC (Thu)
by nix (subscriber, #2304)
[Link] (3 responses)
Posted Jan 4, 2018 21:44 UTC (Thu)
by roc (subscriber, #30627)
[Link] (2 responses)
Even if you think you can fix all those (I don't see how), it's difficult to be confident people aren't going to come up with new ways to estimate time. And each mitigation you introduce degrades the user experience.
Posted Jan 4, 2018 22:55 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
Posted Jan 5, 2018 17:26 UTC (Fri)
by anselm (subscriber, #2796)
[Link]
One important observation with covert channels is that in general, covert channels cannot be removed completely. Insisting that a system be 100% free of all conceivable covert channels is therefore not reasonable.
People doing security evaluations are usually satisfied when the covert channels that do inevitably exist provide such little bandwidth that they are, in practice, no longer useful to attackers.
Notes from the Intelpocalypse
Notes from the Intelpocalypse
Notes from the Intelpocalypse
Notes from the Intelpocalypse
Notes from the Intelpocalypse
Notes from the Intelpocalypse