No I am not suggesting that there are less x86 always on systems but I am saying that since the x86 hardware is diverse then it adds attack complexity.bensimmo wrote: ↑Mon Jul 01, 2019 1:30 pmIt's a drop in the ocean compared to these portable computer things I'm holding in my hand typing this on.Heater wrote: ↑Mon Jul 01, 2019 12:45 pmLeMoog,Nonsense.With a vulnerable PI with it's single hardware base then it is going to be hit harder than even the x86 especially with the emphasis upon IOT and other always on services.
Firstly are you suggesting that that x86 systems used by MS, Google, Amazon and most other cloud service providers aren't allways on? It's news to me that they turned them off at night
Anyone building IoT boxes should not be running any code random code of unkown origin that the device thinks is a good idea to download and run. If it is then there are bigger more easily exploited vulnerabilities in store for it.
Despite the amazing sales of the Pi it's still a drop in the ocean compared to x86 for PCs, laptops, servers. It's a drop in the ocean compared to all the other IoT systems out there.
If you want to forgo the Pi and stay with your far more insecure PC then go ahead.
Which I believe is Linux right at the bottom of it all.
I'm assuming there are a couple of them around, and some powerful one must use the same processor, lucky for me mine only has 8 of the lowly A53
If you are talking about cloud services they are going to invest more time/resources in monitoring for attack that someone who just wants their electronics connected to the internet.
As to IOT and "unknown code" including the OS, APPS and extensions in the standard build then it is all about who you trust to put your security first.
I seem to remember that when Spectre first became a known issue, ARM stated that none of their effected designs were in production and yet here we have a spectred SOC that, it must be said, has been put into production since Spectre became common knowledge.
For me, the worst thing about spectre was not that it breaks memory protection, rather it was the sheer amount of BS posted by shills about how significant the threat was. Given that the majority of internet sites require client side processing then the chances of being able to run only known good code are minimal if you want to use a system on the web. Any server accessible via the web is going to be scanned multiple times daily and pretending that you are safe where you haven't even bothered to look at the source running on that system is just asking for trouble.
So your PI gets rooted, so what? well who's door are the police going to be kicking in when your server starts downloading kiddy porn? when they take away all your electronics for, at a minimum, months are you still going to be saying how that doesn't matter then too? how about when your friends find out about it, are they going to trust that you are 100% innocent?
You want to play dangerous games then go ahead, I will be watching the press for the first victim and waiting for the resulting belief that every RPi owner is suspect.
Spectre was always writting off security for a significant performace boost, which intel used to lead the CPU market for decades, they knew is was dodgy but since people didn't know it was a problem they kept buying. Now people do know it is a problem and to keep selling now is unforgivable.