Separate names with a comma.
Discussion in 'Video Game Forum' started by PEB, Jan 3, 2018.
I downloaded the Windows 10 update, I say now change in a Cinebench benchmark for my i5-4590.
Haven't had the fix in windows update (UK) should I just wait?
Google released another statement
This is a quote from the guy who discovered the problem.
"Gruss and his colleagues had just confirmed the existence of what he regards as "one of the worst CPU bugs ever found"."
Windows benchmarks including games. 4k reads seem to be taking a big hit, nothing else was affected though. He commented in the comments that he tested with a 2600k and has got similar results.
Official response from AMD opens the door to potential problems but states it's safe as of right now.
Variant / AMD Response Matrix
Google Project Zero (GPZ) Research Title Details
Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences.
As the security landscape continues to evolve, a collaborative effort of information sharing in the industry represents the strongest defense.
Total protection from all possible attacks remains an elusive goal and this latest example shows how effective industry collaboration can be.
As always, AMD strongly encourages its customers to consistently undertake safe computing practices, examples of which include: not clicking on unrecognized hyperlinks, following strong password protocols, using secure networks, and accepting regular software updates.
Tech Yes City with more gaming benchmarks with a Xeon X5670 (LGA1366). Adobe Premier as well.
AMD is big winner from chip flaw fiasco as more than $11 billion in Intel stock value is wiped out
LOL, yeah, I'd say so:
After Meltdown and Spectre revelation, questions arise about timing of Intel CEO’s stock sales
And yet, in spite of it all, LMFAO:
AMD seems to keep having things fall into their lap, which is awesome because we're starting to see competition again. The crypto craze hit at the perfect time to help them move massive amounts of cards and now this. Ryzen 2 is lining up to be a huge seller.
Raspberry Pi's are safe
That must have been one hell of a night. It's no wonder he couldn't sleep.
lol maybe i should look into a ryzen build
Gaming isn't affected.
I mostly stopped caring after that.
8700k then it is
It''s not about gaming you need to watch the video I posted. The chips defective a software patch to the eprom will not repair the chip.
The only corrective way is to do a hardware change or redesign the cpu. Intel releasing a software patch will only buy time hackers will find workarounds.
The other issue is DirectX games Microsoft has not released their patch they waited till Intel released their code patch then motherboard vendors have to update their boards code.
I think you, like a lot of fanboys and the media, are blowing this waaaay out of proportion. Yes, there is an issue. And yes, it's being fixed. Remember when everyone's bank accounts got hacked during Heartbleed?
There has been speculation that the deployment of KPTI causes significant performance slowdowns. Performance can vary, as the impact of the KPTI mitigations depends on the rate of system calls made by an application. On most of our workloads, including our cloud infrastructure, we see negligible impact on performance.
“We don’t expect meaningful performance impact for most customer workloads,” Amazon told Business Insider. “There may end up being cases that are workload or OS specific that experience more of a performance impact. In those isolated cases, we will work with customers to mitigate any impact.”
Jesus...is your grasp of all this really that feeble?
"VariantTwo Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecturedifferences."
Like I posted above, there's a lot of fanboyism and media blowing this way out of proportion.
There's security flaws that are patched all the time, we just don't know about them. The only reason we heard about this is that is was leaked and someone broke the NDA.