Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So what? The defense relies on it serializing the instruction stream which is not necessarily true based on the semantics of the instruction (until it was retroactively documented to do so)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: