Apple Reacts to Unfixable Chip Exploit

preview_player
Показать описание
Researchers just discovered a vulnerability built in to Apple’s new M series chips. But don’t worry, it can’t be fixed and only affects... all their computers.

-----------------------------------

'Escape the ordinary. Embrace the FUNKY!'

-----------------------------------

SAMTIME is a parody channel and does not represent the tech company featured.

Copyright FUNKY TIME PRODUCTIONS 2024
Рекомендации по теме
Комментарии
Автор

Lol using doggos to explain computer processes is next level creativity!

aasishwarsaravana
Автор

the dogs in the water was the best computational explanation I've seen all year

rorymacphee
Автор

Apple knows a great deal about cash/ cache.... kaching!!! 😂😂😂

FahimMahbub
Автор

Apple is so anti-repair, they can't even repair their own computers. They're getting a taste of their own medicine.

eric
Автор

Don't worry, no one can steal your money because there is nothing left once you buy Mac

ArikCool
Автор

Haha that dog jumping on the woman made my day😂

nholmes
Автор

"should we call an engineer ?" No call an Apple store and prepare them to sell suckers replacement macbooks

rocketmunkey
Автор

Ain't their lawyers already busy with all the lawsuits? 😂😂😂 Call Tim

Chris_Mw
Автор

I like the analogy that a cache is like the chair in your bedroom where you put all your cloths. Its just faster than putting them back in the closet and out again.

nathanoy_
Автор

SAMTIME has inadvertently become my go-to tech news channel.

yt_Ajay_
Автор

Not gonna lie, I’ve got to watch this video again. As soon as the dogs showed up in the pool my brain checked out and they were all I could focus on. 😁

iMisanthrope
Автор

The Gill Bates joke was pretty funny. 😂

PhilipMarcYT
Автор

The exploit is highly theoretical. Not an Apple fanboy here, but if you read the paper you realize that this is only realistically working in a lab. Even with direct access to the processor, a process would have to be reusing the same key for hours for it to be leaked, because the speed at which data is extracted is incredibly low and data stays in the cache only for a brief amount of time (definitely not several minutes, which is the minimum amount of time required to leak some of the shorter keys shown in the paper)

nocturnx
Автор

0:10 I unconsciously replace your face with Tim Cook's. Kinda fitting with Tim's expression and his action 😂

kamikakushi_
Автор

Bonus points for all the cute dog footage.

wisteela
Автор

I work in IT Security and Scan for vulnerabilities of many companies networks every week…. This vulnerability is relatively small compared with the software vulnerabilities we report weekly. I use a Mac and when compared with Windows Machines over the last two years of reporting..it’s almost always at the very bottom of the list of “Riskiest Assets” in our organization.

dkipu
Автор

M3 has a flag that can be set to defeat the vulnerability, but at the cost of performance. M2/M1 does not have the flag.

aldarrin
Автор

Perfect mastermind plan to make people buy M4

einstien
Автор

there's a similar type of attack strategy and reading info off the CPU cache called Spectre attack, and this affects almost every computer system, including desktops, laptops, mobile devices, Intel processors, AMD processors, ARM-based processors, and IBM processors. Here I'm not defending Apple but this is a fact you have to live with until whole speculative execution system is rewritten at the cpu architecture level.

vutfiq
Автор

i heard tim cook was into backdoors but i didnt think they meant the CIA

kzzrvde
welcome to shbcf.ru