Hacker News new | past | comments | ask | show | jobs | submit login

> You could've found them by reading the manual

Pretty much. Everything you needed to figure this out was public.

Just publishing stuff doesn't help much in areas this complex and specialized where there are a very small number of people who can really understand what is published.

There is also a major difference between reading a spec and discovering an exploit through an adversarial process.

Nobody who had complete access to confidential data (at Intel or anywhere else) figured this out. People on the outside working with an adversarial process did.

The adversarial process is driven by testing not documentation. There is no reason to think that the people who figured it out would have been aided by having more internal documentation.




I'm sorry but the implementation of the speculative execution or the branch predictors was not available at all.

Could you tell for example that AMD wasn't vulnerable to meltdown but Intel was by looking at any docs? Not really.


> There is no reason to think that the people who figured it out would have been aided by having more internal documentation.

Why not?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: