researchers find unfixable bug in apple computers

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 พ.ค. 2024
  • A new bug in the Apple M1, M2 and M3 Silicon is reeking havoc.
    Spectre Paper: spectreattack.com/spectre.pdf
    Gofetch Info: gofetch.fail
    Gofetch Paper: gofetch.fail/files/gofetch.pdf
    🏫 COURSES 🏫 Learn to code in C at lowlevel.academy
    👕 MERCH 👕 Like the shirt? lowlevel.store
    📰 NEWSLETTER 📰 Sign up for our newsletter at mailchi.mp/lowlevel/the-low-down
    🛒 GREAT BOOKS FOR THE LOWEST LEVEL🛒
    Blue Fox: Arm Assembly Internals and Reverse Engineering: amzn.to/4394t87
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : amzn.to/3C1z4sk
    Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : amzn.to/3C1daFy
    The Ghidra Book: The Definitive Guide: amzn.to/3WC2Vkg
    🔥🔥🔥 SOCIALS 🔥🔥🔥
    Low Level Merch!: lowlevel.store/
    Follow me on Twitter: / lowleveltweets
    Follow me on Twitch: / lowlevellearning
    Join me on Discord!: / discord
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 1.4K

  • @LowLevelLearning
    @LowLevelLearning  หลายเดือนก่อน +234

    Come learn C so this doesn't happen again at lowlevel.academy (there's a SALE)

    • @peppybocan
      @peppybocan หลายเดือนก่อน +4

      should I buy a new mac?

    • @negativeseven
      @negativeseven หลายเดือนก่อน +49

      C, the notorious bug killer

    • @oniimaxxxx6479
      @oniimaxxxx6479 หลายเดือนก่อน +10

      Fix your website first

    • @macgyverswissarmykni
      @macgyverswissarmykni หลายเดือนก่อน +5

      ​@@negativesevenIt's the safest language out there

    • @mmkamron
      @mmkamron หลายเดือนก่อน +2

      @@oniimaxxxx6479 🤣🤣

  • @not_hehe__
    @not_hehe__ หลายเดือนก่อน +2603

    always terrible when researchers accidentally stumble upon your NSA backdoor :(

    • @isbestlizard
      @isbestlizard หลายเดือนก่อน +205

      As they say, when one door closes, another one opens...

    • @ereder1476
      @ereder1476 หลายเดือนก่อน

      ​@@isbestlizard ... And hit your balls ...

    • @TomNimitz
      @TomNimitz หลายเดือนก่อน +131

      NSA be like "Damn, we've been outed."
      ISIS and others be like "Time to switch to Lenovo."
      China be like "Sounds good. More data for us."

    • @arthurdent5357
      @arthurdent5357 หลายเดือนก่อน +20

      It doesn't close though, since it's unfixable.

    • @brianhirt5027
      @brianhirt5027 หลายเดือนก่อน

      Nah. NSA prefers it's math nerd probablistic cracks. Nobody but NOBODY at the NSA interested or capable of doing field work. If this fault is only locally accessible you can count NSA out of the running to take advantage of.

  • @lbgstzockt8493
    @lbgstzockt8493 หลายเดือนก่อน +3307

    The only hard things in computer science are naming things and cache invalidation.

    • @Jeremy-rg9ug
      @Jeremy-rg9ug หลายเดือนก่อน +838

      I like this variant: The two hardest things in computer science: naming things, cache invalidation, and off by one errors

    • @cinderwolf32
      @cinderwolf32 หลายเดือนก่อน +141

      ​@@Jeremy-rg9ug And cache invalidation

    • @theninjascientist689
      @theninjascientist689 หลายเดือนก่อน +30

      That's just a 0 indexed array

    • @theninjascientist689
      @theninjascientist689 หลายเดือนก่อน +26

      conditions and race

    • @traywor1615
      @traywor1615 หลายเดือนก่อน +60

      @@cinderwolf32 I think we forgot cache invalidation.

  • @coolbrotherf127
    @coolbrotherf127 หลายเดือนก่อน +563

    Computer architecture is so much more complicated than most people realize, even many programmers. I remember in college learning about concepts like superscalar pipelining and micro code for the first time. It still fells like there was always something new and complex to learn about computers.

    • @Bob-em6kn
      @Bob-em6kn หลายเดือนก่อน +35

      So true. And most of the time, they are not important until they are.

    • @delarosomccay
      @delarosomccay หลายเดือนก่อน +25

      I was so proud of building my first CPU and ISA in an EE class I was taking in the 90s. Then I learned about superscaler pipelining and micro code, and realized I knew nothing :P. My little ISA and CPU is an Arduino at best :P Still though, I love this job. It helps to understand how things work under the hood when writing code.

    • @jbird4478
      @jbird4478 หลายเดือนก่อน +15

      @@delarosomccay Yes, it helps to understand how things work under the hood to some extent, but modern CPUs are mindblowingly complex. For programming it helps to grasp the bigger picture of it, but the details are honestly way above my skill and paygrade to understand.

    • @BrandyBalloon
      @BrandyBalloon หลายเดือนก่อน

      @@jbird4478Back in the 80's, I was able to understand in detail how every part of my computer worked. In the 90's the details started to become challenging. Anything made this century I have no chance, it's hard enough just at a conceptual level.

    • @TheAwillz
      @TheAwillz หลายเดือนก่อน +10

      Yeah tbf the levels of abstraction are wild

  • @nefrace
    @nefrace หลายเดือนก่อน +2678

    0:15 "It is unpatchable unless you literally go to the store and get different CPU..."
    If only it can be a thing with Apple

    • @no_name4796
      @no_name4796 หลายเดือนก่อน +272

      "Oh you want a safe cpu, without any (found) vulnerability? That's gonna cost you 2000$ for a mac, thanks!"

    • @Eutropios
      @Eutropios หลายเดือนก่อน +14

      Unpathcable?

    • @David_Box
      @David_Box หลายเดือนก่อน

      @@no_name4796Nah, Apple would try to spin it like it's a good thing: "In accordance with the fact that we truly care about our customers, we've generousely decided to offer separate replacement cpus for the price of a whole new pc, just for this occasion. (official replacement procedure costs 7 grand extra)"

    • @Spiker985Studios
      @Spiker985Studios หลายเดือนก่อน +48

      @@Eutropios Meant to be unpatchable

    • @nefrace
      @nefrace หลายเดือนก่อน +20

      @@Eutropios thanks for noticing my typo (:

  • @veis2208
    @veis2208 หลายเดือนก่อน +898

    One of the guys who discovered Meltdown/Spectre is my Prof at University

    • @LowLevelLearning
      @LowLevelLearning  หลายเดือนก่อน +182

      Niiiiiice

    • @maximilianstallinger735
      @maximilianstallinger735 หลายเดือนก่อน +29

      tug student spotted

    • @veis2208
      @veis2208 หลายเดือนก่อน

      @@maximilianstallinger735 😂

    • @LolSalat
      @LolSalat หลายเดือนก่อน +10

      you're at CISPA or Graz? xD

    • @tstahlfsu
      @tstahlfsu หลายเดือนก่อน +2

      Woah!

  • @The0rangeCow
    @The0rangeCow หลายเดือนก่อน +1189

    The CIA must be really broken up about this getting discovered.

    • @phillippereira6468
      @phillippereira6468 หลายเดือนก่อน +3

      how do you know what they use

    • @andrewferguson6901
      @andrewferguson6901 หลายเดือนก่อน +15

      @@phillippereira6468 apple patched it pretty quickly with the m2, right? Seems reasonable that it was discovered and addressed in private in the interest of national security

    • @numb0t
      @numb0t หลายเดือนก่อน

      Apple is trash anyways

    • @geekswithfeet9137
      @geekswithfeet9137 หลายเดือนก่อน

      @@andrewferguson6901 it’s not patched, I don’t know where you’re getting that information

    • @toddmaek5436
      @toddmaek5436 หลายเดือนก่อน +152

      @@andrewferguson6901 maybe it was placed there to begin with "in the interest of national security"

  • @philipthatcher2068
    @philipthatcher2068 หลายเดือนก่อน +68

    Knowing stuff is cool, but being able to explain it to others is the real talent. You managed that on a very complicated topic. Very impressive. Very well done.

    • @Tech-geeky
      @Tech-geeky หลายเดือนก่อน

      but if he didn't understand what was talked about either, its just nonsense. Perhaps its more "I know, but let you read it yourself because if I explain it, will go over everyone's head;
      ...or could just be he has no idea:)

  • @Rozelkyia
    @Rozelkyia หลายเดือนก่อน +543

    In the description: Reeking implies that it smells, wreaking is the word you were looking for.

    • @afrofantom6631
      @afrofantom6631 หลายเดือนก่อน +60

      it does reek cause this is some bullshit

    • @noth1ngnss921
      @noth1ngnss921 หลายเดือนก่อน +12

      Yep. I think he might have confused 'wreak' with the figurative use of 'reek' (ie. ”This reeks of [a bad thing that might not smell in the literal sense]”).

    • @pah967
      @pah967 หลายเดือนก่อน +16

      maybe he meant its a stinky bug

    • @anon_y_mousse
      @anon_y_mousse หลายเดือนก่อน +26

      If enough people keep making this error they'll just change the dictionary. Sad.

    • @walrusmedia924
      @walrusmedia924 หลายเดือนก่อน +3

      It does reek because this code smells

  • @Dominexis
    @Dominexis หลายเดือนก่อน +271

    This reminds me of that one time on the oldest anarchy server in Minecraft when some nerds found out you could punch a block anywhere in the world to 1) see if that chunk is loaded, and 2) see what type of block it is. Well turns out by comparing what chunks are loaded and when against when players log in and out, you're able to figure out which group of chunks is from what player, and track everybody on the server in real time. Then through a long series of punches in those areas, you're able to reconstruct an entire base block for block.
    Getting all the memory of a process by listening closely to see how long each operation takes reminded me a lot of that.

    • @pawek02
      @pawek02 หลายเดือนก่อน +12

      is there a video about it?

    • @keent
      @keent หลายเดือนก่อน +15

      @@pawek02 yep there's a good documentary about it but forgot the title and channel

    • @mz7315
      @mz7315 หลายเดือนก่อน +29

      @@keent its called fitmc.

    • @iwolfman37
      @iwolfman37 หลายเดือนก่อน +15

      Just say 2b2t, everybody knows it, it's not a secret

    • @HunsterMonter
      @HunsterMonter หลายเดือนก่อน +44

      @@iwolfman37 The meme is that everyone refers to 2b2t as "the oldest anarchy server in Minecraft"

  • @JxH
    @JxH หลายเดือนก่อน +33

    "...constant time programming..." Decades ago, there was a game (something with ghosts in a graveyard ?) for the Z-80 based TRS-80. The game was designed so that an AM radio, placed next to the computer, would pickup RFI in the form of the game's musical soundtrack. Yes, the programmer(s) embedded music into the RFI based on intentionally non-constant time programming.

    • @stringlarson1247
      @stringlarson1247 หลายเดือนก่อน +1

      I remember those days.

    • @user-em8ip9ys9z
      @user-em8ip9ys9z หลายเดือนก่อน

      I used the TRS-80 when I was 13. My middle school bought a few of them and would let students sign up to take them home over the weekend. The ROM had a BASIC interpreter and supported a cassette tape player for mass storage. I never tried to do assembly code for the thing, but I understood that the games I played were written in assembly/machine code.

  • @Yupppi
    @Yupppi หลายเดือนก่อน +483

    To me the thought that people actually even know how the cpu works is unfathomable, but then there's people who want to abuse it that know even more.

    • @vincentlemoine3830
      @vincentlemoine3830 หลายเดือนก่อน +68

      You need people who know how to make them to begin with

    • @Freshbott2
      @Freshbott2 หลายเดือนก่อน +71

      Often the people who find CPU vulnerabilities are people who design them

    • @zackbuildit88
      @zackbuildit88 หลายเดือนก่อน +9

      Most CPU stuff isn't really that hard. Really, the only hard thing about CPUs is the fact that they're all made to use X86 these days, and X86 specifically is RIDICULOUSLY overcomplicated

    • @Freshbott2
      @Freshbott2 หลายเดือนก่อน +14

      @@zackbuildit88 maybe for something like RISC V, but for any mainstream ISA including ARM it’s just absurd. Jim Keller’s own words - the ARM instruction set is just unfathomably complex.

    • @rakasaac2197
      @rakasaac2197 หลายเดือนก่อน +6

      I mean, ask any random Joe on the street how a CPU works and 99% of them won’t give a sufficient answer.

  • @caleblaws7722
    @caleblaws7722 หลายเดือนก่อน +283

    Someone at my university was working on a side channel attack that would measure the fluxuations on a power rail of the processor and use that to eliminate possible attempts at crytographic keys. Wild stuff.

    • @lbgstzockt8493
      @lbgstzockt8493 หลายเดือนก่อน +86

      Power based side channel attacks are really "common", it's part of why secure programs sometimes use branchless programming so you can't correlate power draw and process state as easily.

    • @catcoder12
      @catcoder12 หลายเดือนก่อน +2

      It's quite common. Over the air power analysis is also one way

    • @scootergirl3662
      @scootergirl3662 หลายเดือนก่อน +12

      Side channel attacks are cray cray

    • @illegalsmirf
      @illegalsmirf หลายเดือนก่อน +3

      that's interesting, I thought uni was only for people with nose rings, neon-colored hair and 'right opinions' on gender and social justice

    • @averdadeeumaso4003
      @averdadeeumaso4003 หลายเดือนก่อน +14

      @illegalsmirf Those you mention are in the "humanities", this is on the "Exact" department

  • @JinskuKripta
    @JinskuKripta หลายเดือนก่อน +295

    In 4:16 you said you would link the paper you are referencing, but I cannot the see the url, I guess you forgot it. Please could which paper it is?

    • @LowLevelLearning
      @LowLevelLearning  หลายเดือนก่อน +232

      Fixed sorry

    • @JinskuKripta
      @JinskuKripta หลายเดือนก่อน +77

      @@LowLevelLearning thanks sir

  • @alefalfa
    @alefalfa หลายเดือนก่อน +355

    As an apple developer I would like to state that there are much more then 1 unfixable bug on apple computers.

    • @WinstonSmithGPT
      @WinstonSmithGPT หลายเดือนก่อน +69

      As an Apple user I would like to state that is very obvious.

    • @patrickday4206
      @patrickday4206 หลายเดือนก่อน +26

      What you mean Apple hardware isn't perfect??? 😂😂😂

    • @alcapoontangmooseinthepoos2310
      @alcapoontangmooseinthepoos2310 หลายเดือนก่อน

      ok nerd

    • @nathantaylor2026
      @nathantaylor2026 หลายเดือนก่อน +14

      Y’all do some weird stuff, I reverse engineer macOS on a regular basis for fun
      Some of the stuff you guys do is odd to say the least

    • @697_
      @697_ หลายเดือนก่อน +39

      @@nathantaylor2026 said the guy who reverse engineers macOS for fun

  • @Howtheheckarehandleswit
    @Howtheheckarehandleswit หลายเดือนก่อน +57

    I feel like the description given of constant time programming is missing something. If memory accesses are forced to take exactly the same amount of time no matter what, then surely the cache would be removed entirely, since even if something was in the cache, the CPU would have to wait as long as it WOULD have taken to get it from anyway to ensure the operation is constant time, no?

    • @maddoggLP
      @maddoggLP หลายเดือนก่อน +12

      That was my thought too. If the cpu needs to pretend the cache hit took as long as a memory fetch then why bother in the first place

    • @ericelfner
      @ericelfner หลายเดือนก่อน +14

      Description was incorrect. I asked my son the same question. It is _much_ more complicated... It involves the malicious code predicting cache locations used, filling those with own values, then seeing if overwritten by using the access timing, and probably much more that he left out or I could not absorb...

    • @Howtheheckarehandleswit
      @Howtheheckarehandleswit หลายเดือนก่อน +5

      @ericelfner That describes the problem that constant time programming would solve: if cache hits and misses take the same amount of time, then you can't get any information out of dumping part of the cache and then timing other processes to see if they access it. My question is, if constant time programming makes them take the same amount of time, why have a cache at all? My guess is that there's probably some specialized set of constant time operations that are very slow but can be used with extremely sensitive data, in addition to the normal variable time operations, but that wasn't explained in the video, which I think it should have been

    • @broski40
      @broski40 หลายเดือนก่อน +1

      @@ericelfneryes!! also bleeds into any Iphone nearbye. Its a big problem as it destroys your logic board by writing over ssd so much. I have a 2021 imac m1 that has had 3 logic board replacements(they paid $700/board). also that its not a bug it is a feature for some, very unsafe feature!! my first mac and iphone because i thought they would be a little more safer then others....wrong again! Good day sir + smart son!

    • @jordanrodrigues1279
      @jordanrodrigues1279 หลายเดือนก่อน

      ​@@Howtheheckarehandleswit
      Unfortunately those instructions don't exist, and because of the way memory modules work, they *can't* guarantee constant time to a high degree of precision.
      There's a complicated shuffling of so called "physical" addresses to the actual physical circuits. This is done for load-balancing reasons and possibly to mitigate row-hammer attacks.
      There's also a timing interaction between addresses and memory refresh commands.
      So what programmers do is: don't allow sensitive data values to determine the order in which memory accesses are requested or the addresses they use - just like you don't allow that data to influence branch instructions.
      We *know* this isn't completely watertight. Intel in particular has data dependent prefetch and there's no way for a normal application to turn it off.
      (It's possible for something in kernel mode to configure regions of memory without cache - very slow, accesses do go straight to the memory controller or IO interfaces. In practice this is used for control registers that belong to peripheral devices. Still isn't 100% constant time because those read-write operations pass through different clock domains, different bus protocols and whatever kind of IO queuing and reordering that implies.)

  • @simonharris4873
    @simonharris4873 หลายเดือนก่อน +426

    Apple's response: People need to learn to hold their CPU the right way.

    • @FLMKane
      @FLMKane หลายเดือนก่อน +5

      Tracks

    • @bob_mosavo
      @bob_mosavo หลายเดือนก่อน +5

      Exactly‼🤣🤣😂😂

    • @josephbenjamin6426
      @josephbenjamin6426 หลายเดือนก่อน +2

      🤣🤣🤣 Classic…

    • @markhathaway9456
      @markhathaway9456 หลายเดือนก่อน +2

      User: I tried holding the rabbit ears different ways, then I shook it and tapped on it, but what really worked was when I crushed it with a hammer. No more bugs.
      Apple dweeb: Oh yea, we've heard that from some other loyal users too.

    • @user-hp3id9lg6j
      @user-hp3id9lg6j หลายเดือนก่อน +5

      It's a feature.

  • @dunar1005
    @dunar1005 หลายเดือนก่อน +93

    Developers of cryptographic libraries can either set the DOIT bit and DIT bit bits, which disable the DMP on some CPUs. Additionally, input blinding can help some cryptographic schemes avoid having attacker-controlled intermediate values, avoiding key-dependent DMP activation.
    So while it not “patchable” You still can prevent it.

    • @yukinoryu
      @yukinoryu หลายเดือนก่อน +1

      But at what cost? :)

    • @tezcanaslan2877
      @tezcanaslan2877 หลายเดือนก่อน +3

      @@yukinoryu maybe a slight performance hit?

    • @daasdingo
      @daasdingo หลายเดือนก่อน +19

      That bit only exists on M3 and Intel 13th gen. It does not work for M1 and M2. For these, input blinding seems to be the only mitigation, at least according to the exploit's website. However, it seems that input blinding might not work for all cryptographic algorithms (at least the website seems to imply that, if any experts could clear that up, would be great!)

    • @jasonthomashorn4794
      @jasonthomashorn4794 หลายเดือนก่อน +1

      DOS the CPU to force it to only run when blinding is off. It would take longer to peek the key but doesn't fully stop it.

    • @KimeeZM
      @KimeeZM หลายเดือนก่อน +1

      ​@@daasdingo I believe you're correct. The DMP prefetcher is only available in apple M and Intel Raptor Lake (and likely upcoming chips from more manufacturers). The DIT bit which is supposed to disable DMP on the apple M1 and M2 is non or mal functional, which means that the these chips need input blinding code. M3 and Intel can use the bit to avoid DMP.

  • @_reatcas
    @_reatcas หลายเดือนก่อน +31

    Remember, is not a bug, it’s a feature.
    An NSA feature

    • @Tech-geeky
      @Tech-geeky หลายเดือนก่อน

      just about everything is. or maybe people are are in denial..... You choose.

    • @inverlock
      @inverlock หลายเดือนก่อน

      NSA doesn’t need this LOL

    • @Tech-geeky
      @Tech-geeky หลายเดือนก่อน

      ​@@inverlock Correction.. NSA has not mentioned it, so the *assumption* is "they don''t". There is no truth to that, but there is also no true they don't either.

  • @chuckgrigsby9664
    @chuckgrigsby9664 หลายเดือนก่อน +32

    I'm thinking that this is three or more orders of magnitude below where my main concerns lie. I'm still trying to figure out how to bypass the ads on TH-cam.

    • @Rocksaplenty
      @Rocksaplenty หลายเดือนก่อน

      Brave browser works seamlessly on mobile and on windows.

    • @dsmb9296
      @dsmb9296 หลายเดือนก่อน +5

      uBlock

    • @D.von.N
      @D.von.N หลายเดือนก่อน

      Brave browser.

    • @kylespevak6781
      @kylespevak6781 หลายเดือนก่อน

      I haven't had them for years 🤷

    • @ratedRblazin420
      @ratedRblazin420 3 วันที่ผ่านมา

      Adblock lmao, and Revanced for Android

  • @l-12343
    @l-12343 หลายเดือนก่อน +3

    this channel is by far one of my favorite channels on youtube! Good work, mate! you are awesome!

  • @DasIllu
    @DasIllu หลายเดือนก่อน +11

    This is retro computing at it's peak.
    Disasters i had long forgotten about, brought back to be enjoyed by a younger audience.
    So nostalgic, so nice of them shelter bugs that were about to go extinct, those poor bugsies.

    • @brandonhoffman4712
      @brandonhoffman4712 หลายเดือนก่อน

      So you forgot about specter and meltdown?
      Ever heard of stuxnet? If not check out how America might have (never claimed guilt) stifled Iran's nuclear program for years.

  • @jpatil5930
    @jpatil5930 หลายเดือนก่อน +96

    I like how his shirt says "everything is open source if you can read assembly" 😂

    • @pah967
      @pah967 หลายเดือนก่อน +9

      well.. technically .. yes

    • @natescode
      @natescode หลายเดือนก่อน +3

      Assembly is rarely the source code though

    • @eksortso
      @eksortso หลายเดือนก่อน +3

      Which is wrong. Just because you can read the source doesn't mean they'll let you use it. Seriously, I hated the shirt so much that I stopped the video after reading it. (I'm watching it again for the first time now.)

    • @arjundureja
      @arjundureja หลายเดือนก่อน +12

      @@eksortso Open source doesn't mean it's free to use either, it depends on the license.

    • @Blitterbug
      @Blitterbug หลายเดือนก่อน +4

      @@eksortso Way to deliberately misunderstand a sentence. It means, 'as opposed to secret, commercial, closed-source projects like Windows'. It obviously doesn't mean you get to use reverse-engineered coder as if it's FOSS. Gah!

  • @everyhandletaken
    @everyhandletaken หลายเดือนก่อน +1

    Really cool when you jumped on a call with Prime & talked about this topic- hoping that will happen again in the future 😀

  • @earthling_parth
    @earthling_parth หลายเดือนก่อน +2

    This was a great explanation which helped clear my doubts around how this was different from Spectre and Meltdown attacks on Intel chips from the past. Thank you. Just subscribed, hoping to learn and appreciate the world of IT a lot more with you.

  • @matthewbass8152
    @matthewbass8152 หลายเดือนก่อน +243

    Last time I was this early I didn’t have kids

    • @PythonPlusPlus
      @PythonPlusPlus หลายเดือนก่อน +22

      Congratulations?

    • @rya3190
      @rya3190 หลายเดือนก่อน +20

      Do you have kids now?

    • @sage-br7ez
      @sage-br7ez หลายเดือนก่อน +2

      You are the fastest man alive sir.

    • @Horopter
      @Horopter หลายเดือนก่อน +20

      Bro is flexing his one pump chump pull out game. 🎉😂

    • @NeunEinser
      @NeunEinser หลายเดือนก่อน +1

      Are the kids now grown up enough to get their own home?

  • @1kreature
    @1kreature หลายเดือนก่อน +3

    So, can we have a tool allowing the backing up of the keys from the M1, M2 and M3's before something goes wrong so the flash data can be decrypted in case of recovery?
    Nice...

  • @mariopalma1132
    @mariopalma1132 หลายเดือนก่อน +1

    Thanks for the video, I was looking 4 info about this matter and your video is quite straightforward, subscribed :)

  • @carimbo8604
    @carimbo8604 หลายเดือนก่อน +1

    This conversation is deeply interesting! I remember the time I used to program in Assembly. Great thoughts, btw!

  • @CatalystNetwork
    @CatalystNetwork หลายเดือนก่อน +7

    Explained a complex problem super super well.
    Well done.

    • @brandonhoffman4712
      @brandonhoffman4712 หลายเดือนก่อน

      And now we need a super super Mario!

  • @dragoons_net
    @dragoons_net หลายเดือนก่อน +6

    Extremely interesting! And detailed, with a lot of pedagogy (lowering stuff to the lewel of the audience). THanks.

    • @Tailspin80
      @Tailspin80 หลายเดือนก่อน

      …and by using a word no one has heard of simultaneously showing your audience they are lower.

    • @jimgardner5129
      @jimgardner5129 หลายเดือนก่อน

      Not low enough for me. Still working on
      "2 + 2 = 4."

    • @dragoons_net
      @dragoons_net หลายเดือนก่อน

      @@Tailspin80 Yes we are, at least me, this watching to learn, big time!

    • @dragoons_net
      @dragoons_net หลายเดือนก่อน

      @@jimgardner5129 ASM...

  • @grep4
    @grep4 26 วันที่ผ่านมา

    I have a many years of infosec experience, and I just want to commend you for doing an excellent job of explaining complex bugs so that they are easy to understand. 👏 Glad TH-cam recommended your channel. I'm sub'd now! 😀

  • @heyitsjel
    @heyitsjel หลายเดือนก่อน +5

    This is literally Apple's version of the Death Star's exhaust port.
    To me, this seems far worse than is casually suggested - your cryptographic keys could be leaked by a simple process executed locally.

    • @Skullet
      @Skullet หลายเดือนก่อน

      Not just Apple, this also effects 13th gen Intel CPUs.

  • @jimmyscott5144
    @jimmyscott5144 หลายเดือนก่อน +3

    Heard you in ThePrime yt clip. I love that he credited your Twitter but not your yt channel.

  • @victorvila1056
    @victorvila1056 หลายเดือนก่อน +1

    I just learned about cache memory in uni and this was so interesting, great video!

  • @mytechnotalent
    @mytechnotalent หลายเดือนก่อน +2

    Love that shirt I must have one! It is quite the exploit as side-channel attacks are pretty foreign to me.

  • @Damariobros
    @Damariobros หลายเดือนก่อน +75

    Just looked it up, looks like the iPad Pro 12.9-inch and iPad Air use the M1 chip. Now we're one step closer to jailbreaking them!

  • @hanfo420
    @hanfo420 หลายเดือนก่อน +3

    if it is a requirement that the timing of a cache hit is the same as a cache miss, the cache has no effect and can be skipped

  • @minhajsixbyte
    @minhajsixbyte หลายเดือนก่อน +2

    heard the phrase "side-channel-attack" some two years ago during my undergrad. never googled it to find what it is, thanks for explaining :3

    • @man_in_space
      @man_in_space หลายเดือนก่อน

      I remember first hearing it in 2010 for the _TRON: Legacy_ ARG. It was kind of implied that you trying to find Flynn by participating in one let CLU find out about the outside world.

  • @luckyff3332
    @luckyff3332 หลายเดือนก่อน +1

    Love your videos
    You was the first time where I saw some concept of assembly language on youtube. I saw some one teaching some sauce on TH-cam

    • @brandonhoffman4712
      @brandonhoffman4712 หลายเดือนก่อน

      I speak the language of assembly everyday!
      On Monday I demolished an exterior landing and began re-assembling it, sloped for code. Yesterday I finished the framework. Today I'm installing backerboard and a waterproofing/anti fracture membrane. Then the venetian tile.
      My assembly language is so good a hacker would have to show up on site with heavy duty hacking tools! You would probably catch him based off the noise he was making while hacking away on my work!

  • @laughingvampire7555
    @laughingvampire7555 หลายเดือนก่อน +4

    well, a local bug like this one is good when you need to recover data from your machine when you need to fight the laptop's security.

  • @duartelucas5746
    @duartelucas5746 หลายเดือนก่อน +3

    Your channel is really interesting!

  • @davidjohnson5635
    @davidjohnson5635 หลายเดือนก่อน

    Hey, this is great! Thanks for talking at such an accessible level.

  • @RonnieBeck
    @RonnieBeck หลายเดือนก่อน

    Great explanation! Thanks for making this video!

  • @thesecretreviewer8242
    @thesecretreviewer8242 หลายเดือนก่อน +3

    that's old school hack, you younglings crack me up

  • @kelvinluk9121
    @kelvinluk9121 หลายเดือนก่อน +12

    tbh if cache adheres to the constant time programming rule, then it's better not to have cache

    • @erikkonstas
      @erikkonstas หลายเดือนก่อน +1

      Yeah what I was thinking 😂 but shh their marketing overlords would have a Meltdown (hehe) over this...

    • @arthurdent5357
      @arthurdent5357 หลายเดือนก่อน +1

      But what about the backdoor then?

    • @AlexPerat
      @AlexPerat หลายเดือนก่อน +1

      *if the entire cache adheres. That's why some parts do and some don't. The fact they didn't do it at the point where they should have is the reason of this vulnerability

  • @EPMTUNES
    @EPMTUNES หลายเดือนก่อน

    This is an excellent video. Your explanations are so intuitive (despite my lack of comp arch stuff)

  • @komm13
    @komm13 หลายเดือนก่อน +2

    always amazed at cache/tlb/memory exploits...very deep rabit hole to dwelve into

  • @paxdriver
    @paxdriver หลายเดือนก่อน +3

    I love episodes like this

  • @afjer
    @afjer หลายเดือนก่อน +11

    If all that's required to access the side channel is for the listener to be running on the same computer, how does that require physical access? All someone would have to do in the hardest case is convince the user to install the listening program.

    • @arofhoof
      @arofhoof หลายเดือนก่อน +1

      This, it seems this attack doesn't need physical access? can someone confirm?

    • @spotlight_is
      @spotlight_is หลายเดือนก่อน +1

      this sounds scary, allowing for existing apps to upgraded automatically that would listen in via osx caching api + timers/custom cleverness.

    • @M0du5Pwn3n5
      @M0du5Pwn3n5 หลายเดือนก่อน +7

      It doesn't. This is a catastrophic vulnerability and it is wildly irresponsible to say "rest assured".
      You should not rest remotely assured. Any executable running on your machine can steal crytographic keys from any other process. Download a game from Steam? Screwed. Download a tool? Screwed. Does anything on your PC autoupdate? Screwed.

    • @DDracee
      @DDracee หลายเดือนก่อน +6

      the attack itself is "easy", the harder part is getting that info back to the attacker, which in that case would require the same sort of malware as usual anyway

    • @spotlight_is
      @spotlight_is หลายเดือนก่อน

      @@DDracee all corporations are saints with honor

  • @Seanfrenchh
    @Seanfrenchh หลายเดือนก่อน

    My first thought when clicking this video is flashbacks of sorting through unsolicited bug bounty emails at work. So this was nice to not hate watching.

  • @soulstenance
    @soulstenance หลายเดือนก่อน

    Lmao, your shirt has me dying. I never really thought about it, but it makes sense conceptually. 😂

  • @nameyname1447
    @nameyname1447 หลายเดือนก่อน +16

    This video was awesome besides the fact that the "if" on your shirt is the only non color-coded word on the shirt despite being the most commonly used.

  • @magellan124
    @magellan124 หลายเดือนก่อน +12

    Sadly, fixing this sounds like it will slow down cpus.

    • @JSiuDev
      @JSiuDev หลายเดือนก่อน +3

      Linux has boot option to disable those fix. But Apple don't. I recall my iMac actually slow down after those meltdown fix went in.

    • @brandonhoffman4712
      @brandonhoffman4712 หลายเดือนก่อน

      Only apple cpu's, in this case.

    • @JSiuDev
      @JSiuDev หลายเดือนก่อน +1

      @@brandonhoffman4712It was am Intel iMac. I am not sure if current M1/M2 cpu has those mitigations.

  • @briankarcher8338
    @briankarcher8338 หลายเดือนก่อน

    I heard you on the Prime video. You know your stuff!
    How somebody discovered this is beyond me.

  • @ammarnanaa6657
    @ammarnanaa6657 หลายเดือนก่อน +1

    Thanks for explaining something that was incomprehensible previously

  • @grify
    @grify หลายเดือนก่อน +26

    typo in description. *wreaking havoc. "reeking" means smelling like something.

    • @JasonKaler
      @JasonKaler หลายเดือนก่อน +3

      smells like a bunch of bad apples.

    • @markhathaway9456
      @markhathaway9456 หลายเดือนก่อน

      @@JasonKaler Smells like BoeingMAX.

  • @mitakeet
    @mitakeet หลายเดือนก่อน +15

    It's 'funny' to me when companies (e.g., Apple) shrug and say there's nothing to worry about - because you have to have physical possession of the machine in order to do the hack. Except all you need is to be able to run software on the machine, which can be done remotely from anywhere in the world. This reminds me of a time (surely patched by now, though it'd been years unpatched already before I learned about it; I've been on Linux for decades) that Windows had a process running on the desktop as local admin - that you could, nevertheless, simply send it key commands as if you were admin operating the UI. They (Microsoft) also said you had to have local access in order to exploit it, and, once again, they ignored anyone who would have a remote desktop on the machine would have access to exactly that.
    Yes, there are plenty of hacks that require actual physical access to the hardware (if someone nefarious can physically touch your machine, it's not yours any longer!), but to claim anything hardware based is immune from remote exploit shows either colossal ignorance of security - or a willingness to bold face lie to their customer base. Knowing how many security experts are at Apple, I'm going with the latter.

  • @elirane85
    @elirane85 หลายเดือนก่อน

    I love side channel attacks, they are always so interesting and ingenious. Sometimes they can literally look like science fiction like the acoustic or electromagnetic ones.

  • @cvlvx1
    @cvlvx1 หลายเดือนก่อน +2

    Really awesome breakdown!

  • @jeffwells641
    @jeffwells641 หลายเดือนก่อน +10

    What's funny is the fix for all of these side channel attacks it's extremely simple, it's just that nobody thought about it before: a simple CPU flag to enable/disable constant time operations on a per-operation basis.
    That's it. If the CPU had this, then in code you could target very specific code where it wasn't safe to optimize the cache, like cryptographic functions, but everything else can run fully optimized.
    If the CPU can mode switch fast enough it also enables less secure but still potentially effective solutions like randomly showing down 5% of cache hits on an operation where you need 100% accuracy to work properly, like encryption/decryption.

    • @stevenlynch3456
      @stevenlynch3456 หลายเดือนก่อน

      That is exactly what I was about to comment. If you add in enough randomness to where statistical tests can't tell you anything about the likelihood of thisTime corresponds to a multiply and thatTime corresponds to an add, then you've effectively solved this time-to-compute vulnerability.
      Also, I've heard that that bit exists. It's called a Chicken Bit because it's a bit that you purposely turn on in order to avoid something else (in this case, avoiding faster execution and therefore avoiding the vulnerability). I read about it on Sophos's website I think.

  • @cherubin7th
    @cherubin7th หลายเดือนก่อน +7

    Cash is king after all.

    • @piedpiper1172
      @piedpiper1172 หลายเดือนก่อน

      Cache is king*
      It was right there man

  • @squid13579
    @squid13579 หลายเดือนก่อน +2

    Hey Low level learning.. at first nice explanation of this vulnerability and 2nd do you read about soflok door vulnerability ?
    It also very recent where researcher break software own cryptography algorithm with some rfid read and writer( MIFARE Classic). It published on ars technica.
    Make video on that vulnerability too. 🔥

  • @kartikkaushik9811
    @kartikkaushik9811 หลายเดือนก่อน +1

    Great video! Clear, concise, and easy to understand

  • @FutureAIDev2015
    @FutureAIDev2015 หลายเดือนก่อน +9

    The way this side channel vulnerability takes advantage of the difference between operation speed in branch prediction, reminds me of a bug mentioned in EVE Online lore.
    There is a way to use a ship equipment module called a data analyzer to gain information regarding when a player owned space station becomes vulnerable to being attacked and destroyed by other players. The description of this module mentions branch prediction vulnerabilities in something called a recursive computing module, which basically is the Eve Online version of a CPU for a space station.

  • @JellySword8
    @JellySword8 หลายเดือนก่อน +88

    Boy, Apple is just having more and more problems this week

    • @tylerdurden9083
      @tylerdurden9083 หลายเดือนก่อน +21

      Every CPU has some sort of this vulnerability, it's not just Apple. And the frustrating part of this is it is very hard to fix without affecting performance!

    • @fishyc43sar
      @fishyc43sar หลายเดือนก่อน

      ​@@tylerdurden9083except in case of other manufacturers, it's easier to apply fixes etc.

    • @SimonVaIe
      @SimonVaIe หลายเดือนก่อน

      ​@@tylerdurden9083 well no. Many had this issue. Years ago. Right now it's apple who put old known bugs in their new architectures.

  • @awlhunt
    @awlhunt หลายเดือนก่อน

    Great explanation, thank you!

  • @kailashbtw9103
    @kailashbtw9103 หลายเดือนก่อน +3

    Really incredible security research. Love these kinds of things!

  • @ajk_
    @ajk_ หลายเดือนก่อน +3

    Thanks for the quality information. Remember to stay hydrated ❤

    • @LowLevelLearning
      @LowLevelLearning  หลายเดือนก่อน

      Hey thank you for watching! Always hydrated lol. (there's water in coffee)

  • @thesenamesaretaken
    @thesenamesaretaken หลายเดือนก่อน +2

    Doesn't it invalidate the utility of the cache for an operation to take the same amount of time whether or not it misses? What is the performance cost of requiring operations to run in constant time?

    • @daasdingo
      @daasdingo หลายเดือนก่อน

      Yes, but I imagine he means that cryptographic operations are implemented in such a way that the cache hit or miss does not affect the running time of the algorithm. I do not think the cache does or should know anything about what its being used for.
      I wish the video was more clear on that, I think it was so confusing because he was talking about the chip performing encryption, which is something that is commonly done not in software, but in hardware (for the most popular algorithms)

  • @billingforsrd3702
    @billingforsrd3702 หลายเดือนก่อน

    Great explanation!

  • @LolSalat
    @LolSalat หลายเดือนก่อน +15

    Microarchitectural attacks are a very fascinating area of attacks. Unfortunately, the way they are presented in media is often very inaccurate and frankly, contains a lot of straight up factual errors.
    I get that it is hard to understand such vulnerabilities especialyl without a background in computer science. But sometimes I wish the reporters would try to understand what they are reporting on before writing an article.
    In the past, people trying to actually understand how such vulnerabilities worked had to read though the paper and try to understand it.
    A very high barrier of entry for people interested in such topics.
    Luckily, researchers tend to put out more high-level (but factually accurate) descriptions for many vulnerabilities in recent years.
    And, quite a few TH-cam channels covering such attacks on a deeper level than mainstream media whilst still being "noob friendly" have gained popularity.
    As a researcher (who is quite new to this field and to research in general), this leaves me very excited for the future, as more and more people interested in this field can find actual information and educate themselves.

    • @BillAnt
      @BillAnt หลายเดือนก่อน

      Remember a few years ago the Bit-Banger attack on Androids exploiting RAM? Chip design in the future will have to include protection against these attacks.

  • @veenallo
    @veenallo หลายเดือนก่อน +27

    😂😂😂Apple developers solving 5 hard Leetcode problems to ship a patch

  • @JasonAfeared
    @JasonAfeared หลายเดือนก่อน +1

    I have zero technical knowledge and happened to stumble upon this video out of sheer curiosity. There seems to be some questions of ethics regarding unified processes regarding the nature of efficiencies and privacy. The attack also seems novel due to the ability to derive information from the CPU through natural leakages and use this information to build the identity of the CPU such that privacy is violated. It seems like a 'low level' existential attack! Interesting af video. Thanks for uploading!

  • @loicr1243
    @loicr1243 หลายเดือนก่อน +1

    I wonder, how is the pre-fetcher able to load the right physical memory area ? Isn't the adress-looking blob in cache some virtual memory adress (as it has been pulled from a process' memory) ? So without knowing the process it belongs to (which I suppose you don't when you have data in the cache), how would you find the physical memory area to load ?

    • @jordanrodrigues1279
      @jordanrodrigues1279 หลายเดือนก่อน

      There's a table of page mappings. The full table is kept in memory (and there's a CPU register that allows the CPU to find it) but there's also a cache *just for page mappings* called a translation look-aside buffer.
      I'm not sure what the rules are for Arm, but PCs have TLB prefetchers; they copy whichever page table entries they want, when they want, autonomously.
      This means if the CPU wants to prefetch a virtual address, it might limit itself to pages which it has TLB entries for. But it can also prefetch the corresponding page entry if it wants to.

    • @loicr1243
      @loicr1243 หลายเดือนก่อน

      ​@@jordanrodrigues1279Yep I am aware of the page table and TLBs.
      My question was oriented on how the DMPs make this mapping. At th etime they read cache, they MUST be aware of which process they are doing the DMP for, otherwise they cannot know how to make the virtual-to-physical adress tranlation, because the page-table is per process afaik (to have proper memory segregation in the virtual space).
      But I figured out it was possible anyway, because in cache a physical adress is mapped to data, so you can go like
      - scan data to find adress-like pattern
      - check which physical adress the cache-line stand for
      - check which process this physical memory is mapped for
      - now you have the process, you can do a proper virtual-to-physical tranlation, to get the physically located memory you want in the cache.
      Don't hesitate pointing out any wrong statement I make, I'm still kind of new in this low-level stuff domain

  • @ZyroZoro
    @ZyroZoro หลายเดือนก่อน +4

    I'm such a noob at programming, but I love watching your videos. Almost everything you say goes over my head and you legit seem like a wizard to me. So the fact that this flies even over your head, I can't even fathom it. I am usually inspired to get better when I see better programmers than me, but sometimes when I see people who are such badasses on a whole other level, it kind of demotivates me because it doesn't seem like it's possible for me to ever get even half as good. Anyways, this bug sounds insane!

    • @cubbyhoo
      @cubbyhoo หลายเดือนก่อน +3

      Know that it is possible! You've just got to keep going. I mean he even says, he doesn't understand all of it! No one finds it easy and everyone has been exactly where you have been with programming. Just keep going and focus on the fundamentals

  • @kborak
    @kborak หลายเดือนก่อน +4

    From what I have seen, this is not a physical access attack.

    • @cattleco131
      @cattleco131 หลายเดือนก่อน +1

      That’s right, but what he meant was, you must have access to run code on the machine first. This particular vulnerability doesn’t give you remote access.

  • @nickadams2361
    @nickadams2361 หลายเดือนก่อน

    Been talking about physical layer exploitation for years. It has the ability to disrupt the entire manufacturing and distribution process at core layers that literally cost billions of dollars to fix

  • @TamLeAuthentic
    @TamLeAuthentic หลายเดือนก่อน +1

    “Where there is a will, there is a way”

  • @BarisPalabiyik
    @BarisPalabiyik หลายเดือนก่อน +4

    This was eye opening. Thanks

  • @swakemudi8682
    @swakemudi8682 หลายเดือนก่อน +9

    when researchers found goverment's backdoor

  • @hellowill
    @hellowill หลายเดือนก่อน

    I remember spectre/meltdown lol. It was when I was taking my first computer architecture paper at Uni. Also around that time Ryzen was launched. Pretty exciting time lol.

  • @ryansteiger6960
    @ryansteiger6960 หลายเดือนก่อน

    Thank you for the video 👍

  • @oberpenneraffe
    @oberpenneraffe หลายเดือนก่อน +3

    It can probably be mitigated by a software update, just like meltdown or specter. There is no way that apple replaces all these devices.

    • @U20E0
      @U20E0 หลายเดือนก่อน +1

      From what i know, a process can just stop DMP from reading its memory by setting a flag.

    • @oberpenneraffe
      @oberpenneraffe หลายเดือนก่อน +4

      ​@@xE92vD It can be prevented by simply disabling DMP. This will cost some performance.
      Fun Fact: You can't "adjust the CPU's internal hardware" after the hardware has been delivered. So Apple will have to rely on software to fix this.

    • @oberpenneraffe
      @oberpenneraffe หลายเดือนก่อน +5

      @@xE92vD I wrote it probably can be mitigated.
      Mitigated != patched, but it will prevent the vulnerability from being exploited.

    • @fulconandroadcone9488
      @fulconandroadcone9488 หลายเดือนก่อน

      @@oberpenneraffe with fuses you can remove functionality

    • @daasdingo
      @daasdingo หลายเดือนก่อน +1

      @@oberpenneraffeNo, this is only possible on M3 (the bit to disable the feature)

  • @druxpack8531
    @druxpack8531 หลายเดือนก่อน +9

    as someone who owns apple hardware and works in IT....shrug. we live in a time where there are vastly more trying to find the exploits than work on the design teams, so there will only be more and more of this. I've patched millions of CVEs in my job, but John and Lisa in marketing are the ones that have gotten us hit with something.

    • @lenerdenator
      @lenerdenator หลายเดือนก่อน +1

      It's amazing how far you can get with a phishing email.
      Re: the Apple silicon bug... meh. So you've gotta have physical access to the machine, and want to peer into another process' secrets. I'm not sure if that's another Spectre/Meltdown, exactly, but if it is, this is far less of a big deal, because the point of those vulns was that they existed on processors that power the vast majority of the world's cloud computing servers, meaning there's a real chance you're sharing the machine with someone else. Very, very, very few Macs host cloud servers.

  • @ivankocienski1
    @ivankocienski1 หลายเดือนก่อน +2

    You can either have fast or secure, pick one

  • @mrkevinp70
    @mrkevinp70 หลายเดือนก่อน

    well explained man... awesome

  • @ianbarton1990
    @ianbarton1990 หลายเดือนก่อน +6

    Why does this need physical access to a machine, surely this is the same class as Spectre and Meltdown in that you just need to be able to execute code on the target machine, right?

    • @SileySiley-dh5qz
      @SileySiley-dh5qz หลายเดือนก่อน +2

      Any code running locally can exploit this bug, that's my understanding.

    • @shrootskyi815
      @shrootskyi815 หลายเดือนก่อน +1

      LLL said access, not _physical_ access. I assume he meant access to the machine as in access to the processor, as in ability to execute code on it.

  • @lolhead7127
    @lolhead7127 หลายเดือนก่อน +3

    When keeping it "It's not a bug but a feature" becomes real

    • @brandonhoffman4712
      @brandonhoffman4712 หลายเดือนก่อน

      Plenty of apples features bug be enough not to buy.

  • @AllanAdamson
    @AllanAdamson หลายเดือนก่อน +1

    adding delays is also how they stopped crashes & ddos attacks online in the early days

  • @Little-bird-told-me
    @Little-bird-told-me หลายเดือนก่อน +1

    Wow, when I thought i knew a bit about computer, there comes an idea which make me go back to square one of computer one o one.

  • @oglothenerd
    @oglothenerd หลายเดือนก่อน +3

    Saw this video 1 hour after it came out. :)
    Btw, making my own compiled language without LLVM.

  • @sprytnychomik
    @sprytnychomik หลายเดือนก่อน +8

    M1 chip was released two years after Spectre and Meltdown...

    • @daasdingo
      @daasdingo หลายเดือนก่อน +2

      I can imagine the design was probably finished already when these came out, the timelines for new chips are loooong.

  • @pvalpha
    @pvalpha หลายเดือนก่อน +2

    I'm going to hazard a guess that if its in the M-series chips its also in the A-series chips that were developed right at the start of the Apple Silicon push. There's a lot of shared infrastructure there.

  • @LucasGalfaso
    @LucasGalfaso หลายเดือนก่อน

    In this specific case, the idea of constant time programming is on the implementation of the encryption algorithms, not on the CPU runtime of the instructions. The underlying issue is that the data that the implementation uses can be understood by the CPU as memory addresses, so based on the side-channel attach, another process can know that the implementation (at some point) produced some data that has that specific shape.
    The proposed solution in the paper and by other CPUs that have the same optimisations is adding an instruction that prevents this behaviour, even when in my (highly subjective) opinion something like CHERI would be a better solution.

  • @mezari9334
    @mezari9334 หลายเดือนก่อน +3

    The year of Asahi Linux??!? /silly

  • @astralfoxy1787
    @astralfoxy1787 หลายเดือนก่อน +6

    CIA backdoor was found too fast, lmao.

  • @zabsetu4964
    @zabsetu4964 หลายเดือนก่อน +1

    I've been working on Python for over a year in my university with some Java in between. I want to delve into C++ but I don't know what to learn before getting into it because some ppl said it's a bit of a jump in the learning given it's more complicated and low level. Would appreciate if you had any advice 😊

    • @LowLevelLearning
      @LowLevelLearning  หลายเดือนก่อน +4

      I highly recommend learning C first. In my opinion C++ has too many confusion features and abstractions that don’t allow you to learn what the CPU does. It’s tricky but it’s not hard

    • @zabsetu4964
      @zabsetu4964 หลายเดือนก่อน

      @LowLevelLearning will do thank you 😊

  • @NexxuSix
    @NexxuSix หลายเดือนก่อน

    LMAO! That shirt says it all! 😂😂😂😂😂😂😂

  • @cinderwolf32
    @cinderwolf32 หลายเดือนก่อน +26

    If your cache doesn't speed up your processor, you shouldn't have cache. It's such a difficult and frustrating thing to navigate cause the simple solution is just crap.

    • @surewhynot6259
      @surewhynot6259 หลายเดือนก่อน +20

      Cache isn't about speeding up the processor... It's about speeding up memory access, which speeds up code execution. The code itself is what determines how much of an effect cache has, not the processor.

    • @Finkelfunk
      @Finkelfunk หลายเดือนก่อน +14

      L1 Cache can be accessed instantly, L3 cache already takes 21 clock cycles to access, RAM takes at much as 1ms. This doesn't sound like much until you realize thst a single clock cycle on a 5Ghz CPU is 0.2ns. Your PC would feel like a Commodore 64 without cache.

    • @danielbriggs991
      @danielbriggs991 หลายเดือนก่อน +5

      I think the point of confusion here stems from when it was said that "most processes adhere to constant-time programming." This perhaps makes it sound like they removed most of the cache fetching-vs.-failing variability but I think that in the case of actual fact they just underscored which opcodes use it and put in the processor's instruction manual "use these only if you'd like to admit time variability in your process." In terms of actual use, almost every program *will* use these almost as much as it did before, but e.g. encryption programs won't.
      Anyway, that's my takeaway after puzzling about this same issue. Someone who actually knows should weigh in.

    • @cinderwolf32
      @cinderwolf32 หลายเดือนก่อน +4

      Yup, I am aware! Constant time programming is a software technique, not a hardware technique. I found it to be slightly misleading how it was mentioned in-context in the video. While secure software can be written using constant time programming techniques, that can't be used to mitigate this issue on the hardware side, since it would involve also mitigating the effectiveness of cache and the CPU would have to wait around for memory all the time. (Or do something like speculative execution, which can also run into this issue.) The multiple levels at which security needs to be analyzed is why FIPS certification is so stringent even about the operating system and hardware a software package runs on.

    • @user-kf3rm3gd5j
      @user-kf3rm3gd5j หลายเดือนก่อน +1

      @@danielbriggs991 I don't know if you are correct. But I know what you said is far more reasonable than the other statements made here. And you even qualified your answer. You are a refreshing change from normal commenting behavior.