Too Long; Didn't Read
In a <a href="https://medium.com/revissolutions/spectre-meltdown-processor-vulnerabilities-what-you-need-to-know-587ebb37f2dc" target="_blank">previous post</a> we discussed the recently disclosed processor attacks called Spectre (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753" target="_blank">CVE-2017–5753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715" target="_blank">CVE-2017–5715</a>) & Meltdown (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754" target="_blank">CVE-2017–5754</a>). While we know that most of our readers are users of technology who simply want to be better at security (and aren’t interested in the technical), we also know that some of our readers enjoy going a bit deeper into the technical weeds. In this post we’ll highlight some of the key technical learning that comes from Spectre and and Meltdown.