You are viewing a single comment's thread from:

RE: The Meltdown and Spectre Vulnerability - Act Now!

in #cryptocurrency7 years ago (edited)

@dutch

This is a great article detailing what the bugs can do. However, I'm not too sure I understand how a user's computer can be infected. Could you please clarify me on this?

Sort:  

The user's computer is not so much infected, as there is a hole in the hardware's security. This hole has always been there, but was only recently discovered by several research teams. A malicious entity could exploit that hole to steal your data.

How can someone's computer get infected? Maybe a malicious software we download off the internet or does the machine need to be compromised physically by the hacker?

Well, that's the thing - all machines are compromised physically. All it takes now is some software to use the hole. It could come from something as simple as a web page.

Oh Ok. I understand now. Thank you very much for taking your time to clarify me :)