John E. Bartley, III (D) K7AAY<p>AMD's security cracked to modify the silicon's behaviour at will. This capability also undermines AMD's secure encrypted virtualization & root-of-trust security mechanisms on Ryzen, Threadripper, & Epyc CPUs. <a href="https://it.slashdot.org/story/25/02/09/2021244/how-to-make-any-amd-zen-cpu-always-generate-4-as-a-random-number" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/02/09</span><span class="invisible">/2021244/how-to-make-any-amd-zen-cpu-always-generate-4-as-a-random-number</span></a> <a href="https://pdx.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://pdx.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://pdx.social/tags/amd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amd</span></a> <a href="https://pdx.social/tags/ryzen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ryzen</span></a> <a href="https://pdx.social/tags/threadripper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threadripper</span></a> <a href="https://pdx.social/tags/epyc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>epyc</span></a></p>