- Joined
- Feb 3, 2017
- Messages
- 3,481 (1.32/day)
Processor | R5 5600X |
---|---|
Motherboard | ASUS ROG STRIX B550-I GAMING |
Cooling | Alpenföhn Black Ridge |
Memory | 2*16GB DDR4-2666 VLP @3800 |
Video Card(s) | EVGA Geforce RTX 3080 XC3 |
Storage | 1TB Samsung 970 Pro, 2TB Intel 660p |
Display(s) | ASUS PG279Q, Eizo EV2736W |
Case | Dan Cases A4-SFX |
Power Supply | Corsair SF600 |
Mouse | Corsair Ironclaw Wireless RGB |
Keyboard | Corsair K60 |
VR HMD | HTC Vive |
That patch is in the operating system kernel. If an attacker can modify that to undo the effects, they have no need to use Meltdown in the first place.what @Manu_PT try to explain is that current patch will become useless once the hackers(nsa) will manage to undo is effects and use the vulnerability again ... so we may have an endless release of patches(if hackers successful attack is discovered..) .... patching the previous patch without success as a soft patch can't fix a cpu architecture design which has a flaw (feature)...