Hey, are you guys interested in an analysis of the two vulnerabilities which affect almost every device? Let me know if you're interested and I'll write a post about it.
Yes, please do. I have yet to see a technical explanation of how these work. I know they exploit CPU hardware but that's about where my understanding ends.
I wrote a post 4 days ago. You can check it out on my profile and please let me know if you liked it or if you need further information on these vulnerabilities.
Yes, please do. I have yet to see a technical explanation of how these work. I know they exploit CPU hardware but that's about where my understanding ends.
I wrote a post 4 days ago. You can check it out on my profile and please let me know if you liked it or if you need further information on these vulnerabilities.