- Apr 21, 2018
- 28 (0.03/day)
|System Name||Wouldn't a laptop be better?|
|Processor||i7-7700k / i7-8700k / Pentium G4560|
|Motherboard||ASUS x2 and a naff MSI mobo.|
|Video Card(s)||GTX 1080ti x2 / GTX 1060|
Glad to hear someone is pro active regarding this.I've been littering their various Facebook posts/giveaways ,and pages with comments and warnings to perspective buyers ,regarding their lack of support in this matter. Hopefully someone decides to look into the matter ,or at least hopefully someone considering purchasing from them ,will think twice beforehand.
I visited MSI's official forums again and thumbed through the junk. I saw the odd plea for fixes but the OP's get shot down with mods saying things like "it's all Intel's fault" and "You'll have to wait".
The MSI H270 board I was talking about is basically worthless without a Spectre patch unless it's used offline.
I won't be purchasing MSI hardware again.
But it hasn't been patched at all on my MSI H270 moboThe thing about Spectre is that there is a time timeframe where it's possible to have the exploit be exploitable. Even if the hole isn't completely patched, if it's been mitigated sufficiently, it's as good as patched. What you have to understand is that this exploit isn't a golden ticket. It lets you observe some protected memory but, it's not like you can read whatever you want as quickly as you want. You're lucky to get 2000 bytes of protected memory in 1 second. This is problematic in a number of ways but the biggest is with data that is time sensitive or is being changed, moved, or whatever. If Spectre has been sufficiently mitigated to say, 100 bytes per second, the number of things you can do with the exploit starts to narrow. This is already a tricky exploit to actually take advantage of. Mitigating it only makes it even harder. Also remember, this is only to read protected memory, not writing, which also narrows the scope of what you can do even further.
Is it a problem? Sure, but it's not like any virus you might get hit with is likely to be trying to use it. There is far lower hanging fruit.
I know, I've read page after page about the exploits till my eyes nearly bled.
Try telling that to a Data Center. A gaping security flaw is still a gaping security flaw regardless of the spin put on it.
This kind of silence from MSI is reckless to put it mildly.