• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel Processors Hit with LVI Security Vulnerabilities, Mitigation Hits Performance Hard

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
38,316 (8.39/day)
Location
Hyderabad, India
Processor AMD Ryzen 7 2700X
Motherboard ASUS ROG Strix B450-E Gaming
Cooling AMD Wraith Prism
Memory 2x 16GB Corsair Vengeance LPX DDR4-3000
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) Creative Sound Blaster Recon3D PCIe
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Microsoft Sidewinder X4
Software Windows 10 Pro
You are absolutely correct! Without this the same easy exploits could be achievable to black hats, who now have much harder time than before due to having to beat a bunch a researchers to the party.
I concede to that argument. But those black hats now have a steady stream of ideas with which to build malware and target unpatched machines. We have a steady stream of patches that cost performance.
 
Last edited:
Joined
Jul 7, 2014
Messages
53 (0.03/day)
Processor Intel i5-3350P
Cooling Scythe Kotetsu
Memory 8GB mixed
Video Card(s) Sapphire Nitro RX 470
Storage 840 EVO + WD Red
Display(s) DELL U2412M
Case CM N200
Audio Device(s) O2+ODAC
Power Supply EVGA Bronze 600W
Mouse Mionix Naos 7000
Keyboard 6Gv2 (it's shit)
Software W10
No the cannot be disabled already for a year+. Those are baked permanently in the kernel.
That's not really true. You can just boot with mitigations=off switch as per kernel-parameters

Nice advertisement. Hint: see who wrote the "article", what is his affiliation, and who publishes the "journal".
 

Dredi

New Member
Joined
Oct 15, 2019
Messages
24 (0.13/day)
i concede to that argument. But those black hats now have a steady stream of ideas with which to build malware and target unpatched machines.
There are a lot easier attack vectors that can be utilized for unpatched systems. For example the openSSL vuneralbilities from a year ago. Do you think that should have been left unpatched as well?
 
Joined
Nov 18, 2010
Messages
4,979 (1.45/day)
Location
Rīga, Latvia
System Name HELLSTAR
Processor Intel 5960X @ 4.4GHz
Motherboard Gigabyte GA-X99-UD3
Cooling Custom Loop. 360+240 rads. 5x Nidec Servo Gentle Typhoons. AC CUPLEX KRYOS NEXT.
Memory 4x8GB Corsair Vengeance LPX 3000MHz 15-17-17-36 CR1
Video Card(s) ASUS 1080 Ti FE + water block
Storage Optane 900P + Samsung PM981 NVMe 1TB + 750 EVO 500GB
Display(s) Philips PHL BDM3270
Case Phanteks Enthoo Evolv ATX Tempered Glass
Audio Device(s) Sound Blaster ZxR
Power Supply Fractal Design Newton R3 1000W
Mouse Razer Basilisk
Keyboard Razer Deathstalker
Software Windows 10 insider
That's not really true.
Few CVE's are hard baked without options to switch off. That kernel.org documentation conflicts with Microsoft published info. Who's telling the truth then?

1583922635526.png
 
Joined
Jan 8, 2017
Messages
4,861 (4.09/day)
System Name Good enough
Processor AMD Ryzen R7 1700X - 4.0 Ghz / 1.350V
Motherboard ASRock B450M Pro4
Cooling Scythe Katana 4 - 3x 120mm case fans
Memory 16GB - Corsair Vengeance LPX
Video Card(s) OEM Dell GTX 1080
Storage 1x Samsung 850 EVO 250GB , 1x Samsung 860 EVO 500GB
Display(s) 4K Samsung TV
Case Zalman R1
Power Supply 500W
There is something bewildering about the way these things are made public :


The hell is this supposed to be ?

AMD is safer only because its market footprint is too small in the datacenter space
No, AMD is safer, that's the end of it.
 
Last edited:

Ned Flanders

New Member
Joined
Dec 4, 2019
Messages
3 (0.02/day)
AMD is safer only because its market footprint is too small in the datacenter space, most of these side-channel attacks affect datacenters, and you can't hack AMD processors for rich bounties (it's similar to the "Macs don't get viruses" fallacy of the 1990s and 2000s).
@btarunr
Whats your opinion on the fact that Meltdown doesn't work on AMD CPUs because the AMD µarch does not (and apparently never did) allow speculative execution across privilege domains (Userspace - Kernelspace). This doesn't sound to me as a question of market share. If AMD was at 80% marketshare, they would still not allow speculative execution across privilege domains while Intels µarch does.
 
Last edited:
Joined
Jun 3, 2010
Messages
820 (0.23/day)
At this point I think the only way Intel can fight these vulnerability discoveries is by killing the bug bounty program, or significantly reducing the bounty. The program has clearly sprung up a cottage industry of security researchers (uni professors and their college grad minions) bruteforcing Intel processors for vulnerabilities that they can write papers on (earn citations), report back to Intel, and claim the cash bounties. The BBP has become a fountainhead of headache for CTOs and CIOs.

AMD is safer only because its market footprint is too small in the datacenter space, most of these side-channel attacks affect datacenters, and you can't hack AMD processors for rich bounties (it's similar to the "Macs don't get viruses" fallacy of the 1990s and 2000s).
Respected editors, can we please get past this AMD bulverism?
AMD is safe because 'meltdown' does not work on the AMD platform. This is not a personal opinion. It just doesn't. I encourage you to find this observation and report as necessary.
Don't skew the argument.
If you read the impact of this, they say somewhere Intel will have to serialize accesses to its ports, effectively turning off speculative execution in some cases.

I cannot even believe this was posted a moment back:
LVI necessitates compiler patches to insert explicit lfence speculation barriers which serialize the processor pipeline after potentially every vulnerable load instruction.
 

Aquinus

Resident Wat-man
Joined
Jan 28, 2012
Messages
11,605 (3.87/day)
Location
Concord, NH
System Name Kratos
Processor Intel Core i7 3930k @ 4.5Ghz
Motherboard ASUS P9X79 Deluxe
Cooling Corsair H100i V2
Memory G.Skill DDR3-2133, 16gb (4x4gb) @ 9-11-10-28-108-1T 1.65v
Video Card(s) Sapphire AMD Radeon RX Vega 64
Storage 2x120Gb SATA3 SSD Raid-0, 4x1Tb RAID-5, 1x500GB, 1x512GB Samsung 960 Pro NVMe
Display(s) 1x LG 27UD69P (4k), 2x Dell S2340M (1080p)
Case Antec 1200
Audio Device(s) Onboard Realtek® ALC898, FIIO Alpen 2 Headphone DAC + Amp
Power Supply Seasonic 1000-watt 80 PLUS Platinum
Mouse Logitech G602
Keyboard Logitech G513 Carbon (GX Blue)
Software Ubuntu 18.04 (5.5.9 Mainline Kernel)
Benchmark Scores Benchmarks aren't everything.
How many real exploits (not PoCs,) actually exist that use these vulnerabilities though?

The reality is that a lot of these exploits (not all of them,) are so hard to use that their usefulness is almost non-existent. Spectre is a great example of a vulnerability that is susceptible to academic papers, but not real users. Making a PoC that can sometimes leak tiny amounts of data under the right conditions doesn't amount to a usable vector for attack, particularly if how you exploit it requires you to give away that you're trying to break the system (like putting it under full load.)
 
Joined
Aug 2, 2012
Messages
605 (0.22/day)
Location
Netherlands
System Name TheDeeGee's PC
Processor Intel Core i7 4770K
Motherboard Gigabyte Z87X-UD5H
Cooling Noctua NH-U14S
Memory Crucial Ballistix Tactical LP 16GB
Video Card(s) MSI GTX 1070 AERO OC
Storage Crucial M4 256GB, 2x Western Digital 1TB 2,5"
Display(s) EIZO CX240
Case Antec P280
Audio Device(s) Creative SoundBlaster ZxR
Power Supply Seasonic P-760
Mouse Logitech G500s
Keyboard Logitech G710+
Software Windows 10 Pro 64-Bit
More performance reductions.

My 4770K... i mean Pentium 3 by now is ready!
 
Joined
Nov 18, 2010
Messages
4,979 (1.45/day)
Location
Rīga, Latvia
System Name HELLSTAR
Processor Intel 5960X @ 4.4GHz
Motherboard Gigabyte GA-X99-UD3
Cooling Custom Loop. 360+240 rads. 5x Nidec Servo Gentle Typhoons. AC CUPLEX KRYOS NEXT.
Memory 4x8GB Corsair Vengeance LPX 3000MHz 15-17-17-36 CR1
Video Card(s) ASUS 1080 Ti FE + water block
Storage Optane 900P + Samsung PM981 NVMe 1TB + 750 EVO 500GB
Display(s) Philips PHL BDM3270
Case Phanteks Enthoo Evolv ATX Tempered Glass
Audio Device(s) Sound Blaster ZxR
Power Supply Fractal Design Newton R3 1000W
Mouse Razer Basilisk
Keyboard Razer Deathstalker
Software Windows 10 insider

eidairaman1

The Exiled Airman
Joined
Jul 2, 2007
Messages
30,428 (6.52/day)
Location
Republic of Texas (True Patriot)
System Name PCGOD
Processor AMD FX 8350@ 5.0GHz
Motherboard Asus TUF 990FX Sabertooth R2 2901 Bios
Cooling Scythe Ashura, 2×BitFenix 230mm Spectre Pro LED (Blue,Green), 2x BitFenix 140mm Spectre Pro LED
Memory 16 GB Gskill Ripjaws X 2133 (2400 OC, 10-10-12-20-20, 1T, 1.65V)
Video Card(s) AMD Radeon 290 Sapphire Vapor-X
Storage Samsung 840 Pro 256GB, WD Velociraptor 1TB
Display(s) NEC Multisync LCD 1700V (Display Port Adapter)
Case AeroCool Xpredator Evil Blue Edition
Audio Device(s) Creative Labs Sound Blaster ZxR
Power Supply Seasonic 1250 XM2 Series (XP3)
Mouse Roccat Kone XTD
Keyboard Roccat Ryos MK Pro
Software Windows 7 Pro 64
Give credit to @biffzinker for posting this news yesterday.
 
Joined
Oct 5, 2017
Messages
595 (0.65/day)
I concede to that argument. But those black hats now have a steady stream of ideas with which to build malware and target unpatched machines. We have a steady stream of patches that cost performance.
Attempting to hide security vulnerabilities both downplays the severity of the problem, and also encourages businesses people rely on to safeguard their data, to also ignore the extent of the issue as the public will not hold them sufficiently accountable.

Think of it this way: Which would you rather have? A world where facebook gets hacked, they say it was an "unexpected and little known vulnerability" and everyone believes them because only Project 0 and Krebsonsecurity ever posted about it?

Or a world where facebook gets hacked, everyone knows the name of the exploit and facebook has to cough up a good reason they weren't secured against it from the day the vulnerability was made public because it was on Techradar, Gizmodo and TPU?

also -

it puts multi-tenant machines, such as physical servers handling multiple tenants via virtual servers.
Presumably you accidentally missed out the words "at risk" ?
 
Joined
Dec 28, 2012
Messages
1,332 (0.50/day)
I concede to that argument. But those black hats now have a steady stream of ideas with which to build malware and target unpatched machines. We have a steady stream of patches that cost performance.
Are you really arguing that these exploits being made public knowledge is giving black hats more info then they already have?

Dude, how many times you going to stick your tongue on the stove before you figure out the stove is hot? Quit with these side arguments that security through obscurity is a good thing. Windows exploits are constantly made public knowledge, and as a result is harder to get into then the likes of MacOs that hid their exploits for years and as a result are leakier then a rusty sieve.

Despite all those patches "costing" performance, intel is still on top for gaming performance, and AMD already humiliated them in everything else. Your average end user doesnt notice significant differences from these patches.

Name a ransomware that leverages a CPU-level vulnerability. Bonus points for one that leverages a side-channel attack vector.
You cant, because they were patched by intel thanks to their bounty program making them aware of issues.

just one swing and a miss after another today eh?
 
Joined
Apr 12, 2013
Messages
3,091 (1.21/day)
Think of it this way: Which would you rather have? A world where facebook gets hacked, they say it was an "unexpected and little known vulnerability" and everyone believes them because only Project 0 and Krebsonsecurity ever posted about it?

Or a world where facebook gets hacked, everyone knows the name of the exploit and facebook has to cough up a good reason they weren't secured against it from the day the vulnerability was made public because it was on Techradar, Gizmodo and TPU?
I'd rather FB die the way of the Dodo or Myspace if we're being generous :nutkick:
 
Joined
Oct 5, 2017
Messages
595 (0.65/day)
I'd rather FB die the way of the Dodo or Myspace if we're being generous :nutkick:
Yeah but we're talking about things that might actually happen in the short-medium term. Facebook isn't going anywhere for at least a while.
 
Joined
Feb 23, 2019
Messages
1,164 (2.83/day)
Location
Poland
Processor Ryzen 7 3700X
Motherboard Gigabyte X570 Aorus Elite
Cooling BeQuiet Dark Rock 4
Memory 2x8 GB Crucial Ballistix Sport LT 3200 CL16 @ 3466 CL 14
Video Card(s) EVGA 1060 6GB SSC
Storage SX8200 Pro 1 TB, Plextor M6Pro 256 GB, WD Blue 2TB
Display(s) BenQ BL2411PT
Case SilverStone Primera PM01 RGB
Power Supply SeaSonic Focus Plus Gold 750W
Mouse SteelSeries Rival 300
Keyboard MK Typist (Kailh Box White)
Joined
Mar 18, 2015
Messages
2,412 (1.30/day)
Location
Long Island
I have seen dozens of announced vulnerabilities for both AMD and Intel CPUs ... what I have never seen is a doumented instance of any of these vulnerabilities ever being exploited. So all that's really of note here is fanboi bickering which has as much valididity as "ntel is still on top for gaming performance, and AMD already humiliated them in everything else ". The definition used for "everything else" is specious.

A PC is a tool ... a tool can only be judged at how well it does it's job, so let's define it's job.

a) Did you build a PC to run benchmarks and get your name on leader boards ?
b) Did you build a PC based upon performance in things that you might do one o do few times a year ?
c) Did you build a PC to play games and run applications on a frequent bias.
d) Did you build your PC to run apps you will never use

Practical people build the boxes based upon c) and c) only ... fanbois squawk about a) and b). Let's look aty TPUs test results. Three is no "Best CPU" .. only the best CPU for a specific set of applications. Looking at 3900X vs 9900KF


1. Cinebench - a) category ... we have yet to be asked to do a build which maximizes Cinebench performance or had a client who uses it to make a living, it's the medical equivalent of a scalpel in a Chiropractice office. We do have lots of folks who use CAD, adding all the PCs in all the offices we've been in, there's prhaps 1 rendering box for every 200 CAD boxes and AutoCAD at $5,000 per seat ($2,00 per year) is not exactly on a any significant % of PCs.

Gotta give an easy win to AMD here, but a 0.50 on market significance.

2. Game / Software Development - d) category ... again an easy win here for AMD; Again, not a lot of market significance, as above, teeny user base.

3. Web Related - c) Category ... performance is split between red and green camps but with differences of /10th of a second, who cares ? Uses can not react quick enough to take advantage of it.

4. Machine Learning \/ Physics / Brain Simulation - d) category. The size of the market here is completely insignificant, and if the % of users here who run this stuff ia mor than 0.2% Id be shocked... Another win for AMD, but not one that will matter to 99+% of the forum audience.

5. Office Suites - Finally a category c) item ... stuff most folks will use frequently enough to matter in a CPU choice. We get a 4% win for Intel in Word, a 1% win for Intel in Powerpoint and a 1% win for AMD in Excel ... the win goes to Intel but the margin is so small as to render in insignificant as "user lag" will make it unnoticable.

6, Image and Video Editing - Another category c) items and here finally one that matters. A 10% advantage to Intel here in Image Editing and a 4.5% advantage in Video Editing. While not a bit thing market share wise, it's over 100 times more significant tham machine learning, brain simulation, software development, etc. 1st significant win for either side here. Google OCR is in the test and it's significant one ... we might use it 3-4 times a year so we use Adobe OCR to do thatas do most of our clients.

7. Virtualization - As we're speaking to desktops not Server functions I'd skip this. Suffice to say Intel gets the win on VM Ware ... AMD gets significant wins in MySQL and jav ... a Bog reason to go AMD ,..if you use them. No relevance if you don't.

8, File Compression / Encryption - A category b) items for most. less and less as time goes by. Big Win for AMD on the compression / Bit win for Intel on encryption ... Who cares ? Not many

9, Media and Sound recording - Would be at thing for youtubers, musicans and similar sorts and similar sorts, AMD dominates the media / Intel dominates the sound... if those are your thang, pay attention ...if not like most, ignore.

10. No one argues the gaming so not worth mentioning.

In short, there is no best CPU... there's only best for you do on your PC. If office suites, gaming, Adobe products or AutoCAD are your thing, Intel is the onbviois choice. If doing brain simulation, encoding, rendering, virtualization is your thing, AMD is the obvious choice.... just look at what YOU do and decide accordingly. As to the invulberabilitoes... call me when ya ready to publish "Patient O's" story. As of yet , I have not seen any instance of theese invulnerabilities being exploited. Until that happens, I'm not paying attention.
 
Joined
Mar 20, 2008
Messages
820 (0.19/day)
System Name Raptor
Processor Core i7 3930K@4.0Ghz
Motherboard ASUS SABERTOOTH X79
Cooling Noctua NH-D14
Memory 4*4GB Gskil RipjawsDDR3 @2133MHz 1.6v
Video Card(s) EVGA GTX980 SC
Storage Vertex 3 SSD 120GB + SanDisk Ultra II 480GB +1TB seagate
Display(s) ACER-H243HX 24"
Case HAF-X
Audio Device(s) on board Realtek
Power Supply Corsair 850HX
Software Windows 10 & 7 dual boot .
I'll be happy if there is a way to avoid fixing these Vulnerabilities , I can't afford losing anymore performance even if it's a fraction .
 
Joined
Nov 13, 2007
Messages
7,831 (1.73/day)
Location
Austin Texas
System Name _
Processor 8700K @ 5.2 Ghz / -1 avx 24/7
Motherboard MSI Z370-A PRO
Cooling 120mm Custom Liquid
Memory 32 GB 3900 Mhz DDR4 17-17-17-34-400 trfc - 2T
Video Card(s) Gigabyte GTX 2080 Ti Windforce (Undervolted OC 1905MHz)
Storage 3x1TB SSDs
Display(s) Alienware 34" 3440x1440 120hz, G-Sync
Case Jonsbo U4
Audio Device(s) Bose Solo
Power Supply Corsair SF750
Mouse logitech hero
Keyboard tenkeyless
Software Windows 10 64 Bit
Benchmark Scores pretty fast!
Also they're not going to ramrod a security patch that drops your performance by 30% -- at that point it will be a toggle or a Windows defender app monitor feature. Just like for phishing sites or malware. It will come down to users having more control. You can easily make sure that only the code you want is running; and let the users let applications in one by one, in addition to a scan of known malware.
 
Joined
May 9, 2012
Messages
6,753 (2.33/day)
Location
Ovronnaz, Wallis, Switzerland
System Name Monster Panzer Max [MPM]/Nostalg33k/Fiio X5 3rd gen/Xiaomi Mi Box S/Honor View 20
Processor i5-6600K 3.9/E8500/RK3188/S905X 4X1.5 A53/Kirin 980 2xA76 (2.6 GHz)+2xA76 (1.92)+4xA53 (1.8GHz)
Motherboard Gigabyte Z170X Gaming 7/XFX 650i Ultra/Fiio/uh?/uh?
Cooling Corsair H115i /Alphacool Eisberg /uh?/Aluminum heatsink/Heatpipe
Memory 4x4gb HyperX Predator 2800 CL14/2gb DDR2 800/1gb/2gb LPDDR3/6gb LPDDR4X dual channel
Video Card(s) MSI GTX 1070 ARMOR 8gb OC/Asus 8800 Ultra/Mali 400MP4/Mali 450MP5/Mali G76MP10
Storage 120gb OCZ VertexIII,1tb/8gb SSHD,2xToshiba 1tb/none/32gb+64gb/8gb/128gb UFS 2.1
Display(s) Medion X58222 32"5ms OC 75hz 2880x1620/Philips 273E3LHSB 27"1ms 1920x1080/~4" 480x800/6.4 inch FHD+
Case Cougar Panzer Max/none/Aluminum and tempered glass/None/alu frame +back/front glass
Audio Device(s) Fiio Q1 Mark II+Logitec Z333/SB Audigy2 Platinum/dual AK4490EN /HDMI audio output/Trn V60/Fiio Fa1
Power Supply Seasonic M12II Evo 750 /Enermax Coolergiant 480/12v 1.5A/Aukey QC3.0 9-12V 1.96A
Mouse Asus ROG Spatha/touch/Xiaomi XMRM-006/touch
Keyboard GMMK TKL+Gateron Red+white keys/touch/none/touch
Software Win10 64/none/Android 5.1.1 custom/Android TV 8.1/Android 9.1.0
Benchmark Scores bench...mark? i do leave mark on bench sometime, to remember which one is the most comfortable. :o
why every time i read ... "Mitigation Hits Performance Hard" i think .... "awwww the improvements Intel implemented to make their CPU's faster turn out to be vulnerabilities, shucks ... who knew ..."
well, can also take it like that, if the CPU was faster with all the vulnerabilities ..: "Intel did take shortcuts in their design to make their CPU faster"
was it on purpose or not ... was it truly vulnerabilities they had no clue about it until some "bug-hunter" found them?

alright, alright, i know AMD has vulnerabilities too (well what... 2? oh ... ) but i think even with mitigations, their performance will keep close to their actual level without them (if they need one ofc)
 
Joined
Feb 3, 2017
Messages
2,215 (1.91/day)
Processor i5-8400
Motherboard ASUS ROG STRIX Z370-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-3200 CL16
Video Card(s) Gainward GeForce RTX 2080 Phoenix
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Logitech G700
Keyboard Corsair K60
why every time i read ... "Mitigation Hits Performance Hard" i think .... "awwww the improvements Intel implemented to make their CPU's faster turn out to be vulnerabilities, shucks ... who knew ..."
well, can also take it like that, if the CPU was faster with all the vulnerabilities ..: "Intel did take shortcuts in their design to make their CPU faster"
Nope. This idea has been making rounds again and it is simply wrong. These vulnerabilities did not help Intel CPU to be faster. These were not shortcuts but an oversight at some level.

Mitigations are software workarounds to hardware problem and this makes them really hard on performance. If you look at the performance of Intel's newer revisions of CPUs with issues fixed, the vulnerabilities (at least the known vectors) cannot be exploited any more, software mitigations are not applied and the performance is the same as before.

Edit:
OK, performance is not quite the same as before because Spectre did make some software changes necessary. However, this 3-4% performance hit (based on Phoronix' testing) is universal across all CPUs.

Also they're not going to ramrod a security patch that drops your performance by 30%
They are not. Intel will deploy mitigations for SGX but consider risk of exploiting the vulnerability in other places small enough to not apply general mitigation. There will be some coordination with OS development to minimize the possibility of OS-level gadgets this type of attack could use. Researchers did seem to agree this was reasonable.
 
Last edited:
Joined
Sep 15, 2007
Messages
3,797 (0.83/day)
Location
Police/Nanny State of America
System Name More hardware than I use :|
Processor 4.7 8350 - 4.2 4560K - 4.4 4690K
Motherboard Sabertooth R2.0 - Gigabyte Z87X-UD4H-CF - AsRock Z97M KIller
Cooling Mugen 2 rev B push/pull - Hyper 212+ push/pull - Hyper 212+
Memory 16GB Gskill - 8GB Gskill - 16GB Ballistix 1.35v
Video Card(s) Xfire OCed 7950s - Powercolor 290x - Oced Zotac 980Ti AMP! (also have two 7870s)
Storage Crucial 250GB SSD, Kingston 3K 120GB, Sammy 1TB, various WDs, 13TB (actual capactity) NAS with WDs
Display(s) X-star 27" 1440 - Auria 27" 1440 - BenQ 24" 1080 - Acer 23" 1080
Case Lian Li open bench - Fractal Design ARC - Thermaltake Cube (still have HAF 932 and more ARCs)
Audio Device(s) Titanium HD - Onkyo HT-RC360 Receiver - BIC America custom 5.1 set up (and extra Klipsch sub)
Power Supply Corsair 850W V2 - EVGA 1000 G2 - Seasonic 500 and 600W units (dead 750W needs RMA lol)
Mouse Logitech G5 - Sentey Revolution Pro - Sentey Lumenata Pro - multiple wireless logitechs
Keyboard Logitech G11s - Thermaltake Challenger
Software I wish I could kill myself instead of using windows (OSX can suck it too).
Intel security article: But, but ,AyyyyMDeeeee! Reeeeee!

Take your intel love affair down a few notches. AMD chose to be safe. Intel choice IPC at all costs. Or they're completely incompetent, it's your pick.
 
Top