|
You are here |
cyber.wtf | ||
| | | | |
embedkari.com
|
|
| | | | | This provides various references related to RISC based devices at one place. There are quick tips as well to learn RISC | |
| | | | |
berthub.eu
|
|
| | | | | Comments are very welcome on bert@hubertnet.nl or @bert_hu_bert. Update: several constructive remarks have been used to improve this text. Thanks! In this post I will attempt to fully explain the Spectre and Meltdown vulnerabilities in an accessible way. I decided to write it up after I realised it took me more than a day to figure it out, even though I've been doing security related stuff on CPUs for 20 years. | |
| | | | |
googleprojectzero.blogspot.com
|
|
| | | | | Posted by Jann Horn, Project Zero We have discovered that CPU data cache timing can be abused to efficiently leak information out of mi... | |
| | | | |
mayaposch.wordpress.com
|
|
| | | Last year I found myself looking at Espressif's ESP32 microcontroller (MCU) in the context of porting the NymphCast receiver (NCS, or NymphCast Server[1]) application to it. This network-based application is responsible for accepting playback requests from clients along with media data to decode using FFmpeg and output to displays and speakers via libSDL. Although the... | ||