369: Another Pass at Bypass
0:00 -:--
Speed
++++++
We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.Sponsored By:Ting: Save $25 off a device, or get $25 in service credits! Promo Code: Visit techsnap.ting.comiXSystems: Get a system purpose built for you. Promo Code: Tell them we sent you!Digital Ocean: Apply our promo snapocean after you create your account, and get a $10 credit. Promo Code: snapoceanLinks:Security Flaw Impacts Electron-Based AppsAttackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security newsAnother severe flaw in Signal desktop app lets hackers steal your chats in plaintextCritical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security newsMicrosoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The RegisterSpeculative Store Bypass explained: what it is, how it worksTechSNAP Episode 351:…