Zenbleed
This could be a problem you care about. Zenbleed:
We now know that basic operations like strlen, memcpy and strcmp will use the vector registers - so we can effectively spy on those operations happening anywhere on the system! It doesn’t matter if they’re happening in other virtual machines, sandboxes, containers, processes, whatever!
Comments
The blog post did a great job explaining what the problem is even to someone like me that does not work on low level programming. This is very interesting stuff.
linveo.com | Shared Hosting | KVM VPS | Dedicated Servers
Mentally strong provider always provisions dedicated cores, so that Zenbleed cannot affect across customers.
HostBrr aff best VPS; VirmAche aff worst VPS.
Unable to push-up due to shoulder injury 😣
Mentally strong customers always use Atom and Pentium, so that Zenbleed cannot affect them at all.
Even if you have dedicated cores, does not mean they got pinned.
Free NAT KVM | Free NAT LXC | Bobr
Some of us need to be able to do floating-point operations though.
haha