Hi Everyone,

There's new research on data leakage due to cpu speculation bugs. It looks 
like there are 3 or 4 new ones in addition to existing ones like Spectre 
and Meltdown.

I'm changing the README's opening paragraph to read like below. About the 
all we can do is apply them as a best effort, and tell folks they are 
probably present.

    Crypto++ attempts to resist side channel attacks using
    various remediations. The remdiations are applied as a best
    effort but are probably incomplete. They are incomplete due
    to cpu speculation bugs like Spectre, Meltdown, Foreshadow.
    Intel generally refers to them as "Microarchitectural Data
    Sampling" (MDS).

We really need cpu manufacturers help here. We can't sidestep the cpu and 
memory.

There's nothing special about Crypto++. Other libraries are experiencing 
the same pain, like Botan and OpenSSL.

Jeff

-- 
You received this message because you are subscribed to "Crypto++ Users". More 
information about Crypto++ and this group is available at 
http://www.cryptopp.com and 
http://groups.google.com/forum/#!forum/cryptopp-users.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/cryptopp-users/feaa7a85-a8f7-412e-a4a5-57e1d931ebf0%40googlegroups.com.

Reply via email to