Author Archive

RISC vs CISC still relevant?

There has been long time discussion on if RISC or CISC processor architecture is more efficient. CISC (Complex instruction set computing) was the most popular architecture before RISC became popular. According to Wikipedia before the RISC philosophy became prominent, many computer architects tried to bridge the so-called semantic gap, i.e. to design instruction sets that

Your computer leaks secret information

This is somewhat worrying development as Wired writes that Researchers develop palm-sized device, built for less than $300, that can steal laptop crypto keys using radio waves leaked by its processor. This Radio Bug Can Steal Laptop Crypto Keys, Fits Inside a Pita article tells that the list of paranoia-inducing threats to your computer’s security