<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Everything Surrounding These New AMD Security Allegations Reeks of a Hit Job &#8211; ExtremeTech</title>
	<atom:link href="http://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 16:37:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585736</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 13:49:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585736</guid>
		<description><![CDATA[AMD Says Patches Coming Soon for Chip Vulnerabilities
https://www.securityweek.com/amd-says-patches-coming-soon-chip-vulnerabilities

AMD Chip Vulnerabilities to be Addressed Through BIOS Updates - No Performance Impact Expected

After investigating recent claims from a security firm that its processors are affected by more than a dozen serious vulnerabilities, chipmaker Advanced Micro Devices (AMD) on Tuesday said patches are coming to address several security flaws in its chips. 

In its first public update after the surprise disclosure of the vulnerabilities by Israeli-based security firm CTS Labs, AMD said the issues are associated with the firmware managing the embedded security control processor in some of its products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.

AMD attempted to downplay the risks, saying that any attacker gaining administrative access could have a wide range of attacks at their disposal “well beyond the exploits identified in this research.”

“Further, all modern operating systems and enterprise-quality hypervisors today have many effective security controls, such as Microsoft Windows Credential Guard in the Windows environment, in place to prevent unauthorized administrative access that would need to be overcome in order to affect these security issues,” the notice continued. 

“Even if the full details were published today, attackers would need to invest significant development efforts to build attack tools that utilize these vulnerabilities. This level of effort is beyond the reach of most attackers,” Trail of Bits added.

Check Point has also confirmed two of the RYZENFALL vulnerabilities following its own review. 

“This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings,” AMD stated last week.

Some have compared the recent AMD vulnerabilities to Meltdown and Spectre, which impact CPUs from Intel, AMD, ARM and others. However, some argued that the issues disclosed by CTS Labs are nowhere near as severe due to the fact that they mostly impact AMD’s Secure Processor technology rather than the hardware itself.]]></description>
		<content:encoded><![CDATA[<p>AMD Says Patches Coming Soon for Chip Vulnerabilities<br />
<a href="https://www.securityweek.com/amd-says-patches-coming-soon-chip-vulnerabilities" rel="nofollow">https://www.securityweek.com/amd-says-patches-coming-soon-chip-vulnerabilities</a></p>
<p>AMD Chip Vulnerabilities to be Addressed Through BIOS Updates &#8211; No Performance Impact Expected</p>
<p>After investigating recent claims from a security firm that its processors are affected by more than a dozen serious vulnerabilities, chipmaker Advanced Micro Devices (AMD) on Tuesday said patches are coming to address several security flaws in its chips. </p>
<p>In its first public update after the surprise disclosure of the vulnerabilities by Israeli-based security firm CTS Labs, AMD said the issues are associated with the firmware managing the embedded security control processor in some of its products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.</p>
<p>AMD attempted to downplay the risks, saying that any attacker gaining administrative access could have a wide range of attacks at their disposal “well beyond the exploits identified in this research.”</p>
<p>“Further, all modern operating systems and enterprise-quality hypervisors today have many effective security controls, such as Microsoft Windows Credential Guard in the Windows environment, in place to prevent unauthorized administrative access that would need to be overcome in order to affect these security issues,” the notice continued. </p>
<p>“Even if the full details were published today, attackers would need to invest significant development efforts to build attack tools that utilize these vulnerabilities. This level of effort is beyond the reach of most attackers,” Trail of Bits added.</p>
<p>Check Point has also confirmed two of the RYZENFALL vulnerabilities following its own review. </p>
<p>“This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings,” AMD stated last week.</p>
<p>Some have compared the recent AMD vulnerabilities to Meltdown and Spectre, which impact CPUs from Intel, AMD, ARM and others. However, some argued that the issues disclosed by CTS Labs are nowhere near as severe due to the fact that they mostly impact AMD’s Secure Processor technology rather than the hardware itself.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585597</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 15:01:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585597</guid>
		<description><![CDATA[“It’s important to note that all the issues raised in the research require administrative access to the system, a type of access that effectively grants the user unrestricted access to the system,” AMD’s Chief Technology Officer Mark Papermaster said in the statement]]></description>
		<content:encoded><![CDATA[<p>“It’s important to note that all the issues raised in the research require administrative access to the system, a type of access that effectively grants the user unrestricted access to the system,” AMD’s Chief Technology Officer Mark Papermaster said in the statement</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585596</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 15:00:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585596</guid>
		<description><![CDATA[AMD Confirms Chip Vulnerability, Says Report Exaggerated Danger
https://www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger

    Company asking for investigation of unusual stock trading
    All potential exploits to be fixed with software within weeks

Advanced Micro Devices Inc., Intel Corp.’s main rival in computer microprocessors, said a report earlier this month alleging that its chips have widespread, fundamental vulnerabilities greatly exaggerated the severity of the threat.

There are 13 potential exploits that will be fixed within weeks through software updates, the chipmaker said Tuesday in a statement. There’s no evidence that of any of those holes has been used for malevolent purposes, and it would be extremely difficult to use any of them to attack computers, the Sunnyvale, California-based company said. AMD saw reports of unusual trading activity in its stock about a week ago when an Israeli company called CTS Labs went public with a report on the flaws and has reported it to the relevant authorities.]]></description>
		<content:encoded><![CDATA[<p>AMD Confirms Chip Vulnerability, Says Report Exaggerated Danger<br />
<a href="https://www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger" rel="nofollow">https://www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger</a></p>
<p>    Company asking for investigation of unusual stock trading<br />
    All potential exploits to be fixed with software within weeks</p>
<p>Advanced Micro Devices Inc., Intel Corp.’s main rival in computer microprocessors, said a report earlier this month alleging that its chips have widespread, fundamental vulnerabilities greatly exaggerated the severity of the threat.</p>
<p>There are 13 potential exploits that will be fixed within weeks through software updates, the chipmaker said Tuesday in a statement. There’s no evidence that of any of those holes has been used for malevolent purposes, and it would be extremely difficult to use any of them to attack computers, the Sunnyvale, California-based company said. AMD saw reports of unusual trading activity in its stock about a week ago when an Israeli company called CTS Labs went public with a report on the flaws and has reported it to the relevant authorities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585474</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 20 Mar 2018 10:36:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585474</guid>
		<description><![CDATA[AMD Chip Flaws Confirmed by More Researchers
https://www.securityweek.com/amd-chip-flaws-confirmed-more-researchers

Another cybersecurity firm has independently confirmed some of the AMD processor vulnerabilities discovered by Israel-based CTS Labs, but the controversial disclosure has not had a significant impact on the value of the chip giant’s stock.

CTS Labs last week published a brief description of 13 allegedly critical vulnerabilities and backdoors found in EPYC and Ryzen processors from AMD. The company says the flaws can be exploited for arbitrary code execution, bypassing security features (e.g. Windows Defender Credential Guard, Secure Boot), stealing data, helping malware become resilient against security products, and damaging hardware.

The flaws have been dubbed MASTERKEY, RYZENFALL, FALLOUT and CHIMERA, and exploiting them requires elevated privileges to the targeted machine — physical access is not required. The security firm will not disclose technical details any time soon in order to prevent abuse.

CTS Labs, which no one heard of until last week, came under fire shortly after its disclosure for giving AMD only a 24-hour notice before going public with its findings, and for apparently attempting to short AMD stock. The company later made some clarifications regarding the flaws and its disclosure method.

Trail of Bits was the first to independently review the findings. The company, which has been paid for its services, has confirmed that the proof-of-concept (PoC) exploits developed by CTS Labs work as intended, but believes that there is “no immediate risk of exploitation of these vulnerabilities for most users.”

“Even if the full details were published today, attackers would need to invest significant development efforts to build attack tools that utilize these vulnerabilities. This level of effort is beyond the reach of most attackers,” Trail of Bits said in a blog post.

“In our opinion the original CTS Labs report might have been problematically phrased in a way that misrepresented the threat model and impact that the RYZENFALL-1 and RYZENFALL-3 vulnerabilities present,” Check Point said in a blog post. “However, problematic phrasing aside, after inspecting the technical details of the above, we can indeed verify that these are valid vulnerabilities and the risks they pose should be taken under consideration.”

“AMD Flaws” Technical Summary
https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/

Technical Summary

The security architecture of modern computer systems is based on a defense in depth. Security features like Windows Credential Guard, TPMs, and virtualization can be used to prevent access to sensitive data from even an administrator or root.

The AMD Platform Security Processor (PSP) is a security coprocessor that resides inside AMD CPUs and is implemented as a separate ARM CPU. It is similar to Intel ME or the Apple Secure Enclave. It runs applications that provide security features like the TPM or Secure Encrypted Virtualization. The PSP has privileged access to the lowest level of the computer system.

The PSP firmware can be updated through a BIOS update, but it must be cryptographically signed by AMD. Physical access is usually not required to update the BIOS and this can be done with administrator access to the computer. The MASTERKEY vulnerability bypasses the PSP signature checks to update the PSP with the attacker’s firmware. Cfir Cohen on the Google Cloud Security Team discovered a similar issue in an adjacent area of the AMD PSP in September 2017.

The PSP also exposes an API to the host computer. The FALLOUT and RYZENFALL vulnerabilities exploit the PSP APIs to gain code execution in the PSP or the SMM.

The “chipset” is a component on the motherboard used to broker communication between the processor, memory, and peripherals. The chipset has full access to the system memory and devices. The CHIMERA vulnerability abuses exposed interfaces of the AMD Promontory chipset to gain code execution in the chipset processor.

Exploitation requirements

    All exploits require the ability to run an executable as admin (no physical access is required)
    MASTERKEY additionally requires issuing a BIOS update + reboot]]></description>
		<content:encoded><![CDATA[<p>AMD Chip Flaws Confirmed by More Researchers<br />
<a href="https://www.securityweek.com/amd-chip-flaws-confirmed-more-researchers" rel="nofollow">https://www.securityweek.com/amd-chip-flaws-confirmed-more-researchers</a></p>
<p>Another cybersecurity firm has independently confirmed some of the AMD processor vulnerabilities discovered by Israel-based CTS Labs, but the controversial disclosure has not had a significant impact on the value of the chip giant’s stock.</p>
<p>CTS Labs last week published a brief description of 13 allegedly critical vulnerabilities and backdoors found in EPYC and Ryzen processors from AMD. The company says the flaws can be exploited for arbitrary code execution, bypassing security features (e.g. Windows Defender Credential Guard, Secure Boot), stealing data, helping malware become resilient against security products, and damaging hardware.</p>
<p>The flaws have been dubbed MASTERKEY, RYZENFALL, FALLOUT and CHIMERA, and exploiting them requires elevated privileges to the targeted machine — physical access is not required. The security firm will not disclose technical details any time soon in order to prevent abuse.</p>
<p>CTS Labs, which no one heard of until last week, came under fire shortly after its disclosure for giving AMD only a 24-hour notice before going public with its findings, and for apparently attempting to short AMD stock. The company later made some clarifications regarding the flaws and its disclosure method.</p>
<p>Trail of Bits was the first to independently review the findings. The company, which has been paid for its services, has confirmed that the proof-of-concept (PoC) exploits developed by CTS Labs work as intended, but believes that there is “no immediate risk of exploitation of these vulnerabilities for most users.”</p>
<p>“Even if the full details were published today, attackers would need to invest significant development efforts to build attack tools that utilize these vulnerabilities. This level of effort is beyond the reach of most attackers,” Trail of Bits said in a blog post.</p>
<p>“In our opinion the original CTS Labs report might have been problematically phrased in a way that misrepresented the threat model and impact that the RYZENFALL-1 and RYZENFALL-3 vulnerabilities present,” Check Point said in a blog post. “However, problematic phrasing aside, after inspecting the technical details of the above, we can indeed verify that these are valid vulnerabilities and the risks they pose should be taken under consideration.”</p>
<p>“AMD Flaws” Technical Summary<br />
<a href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/" rel="nofollow">https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/</a></p>
<p>Technical Summary</p>
<p>The security architecture of modern computer systems is based on a defense in depth. Security features like Windows Credential Guard, TPMs, and virtualization can be used to prevent access to sensitive data from even an administrator or root.</p>
<p>The AMD Platform Security Processor (PSP) is a security coprocessor that resides inside AMD CPUs and is implemented as a separate ARM CPU. It is similar to Intel ME or the Apple Secure Enclave. It runs applications that provide security features like the TPM or Secure Encrypted Virtualization. The PSP has privileged access to the lowest level of the computer system.</p>
<p>The PSP firmware can be updated through a BIOS update, but it must be cryptographically signed by AMD. Physical access is usually not required to update the BIOS and this can be done with administrator access to the computer. The MASTERKEY vulnerability bypasses the PSP signature checks to update the PSP with the attacker’s firmware. Cfir Cohen on the Google Cloud Security Team discovered a similar issue in an adjacent area of the AMD PSP in September 2017.</p>
<p>The PSP also exposes an API to the host computer. The FALLOUT and RYZENFALL vulnerabilities exploit the PSP APIs to gain code execution in the PSP or the SMM.</p>
<p>The “chipset” is a component on the motherboard used to broker communication between the processor, memory, and peripherals. The chipset has full access to the system memory and devices. The CHIMERA vulnerability abuses exposed interfaces of the AMD Promontory chipset to gain code execution in the chipset processor.</p>
<p>Exploitation requirements</p>
<p>    All exploits require the ability to run an executable as admin (no physical access is required)<br />
    MASTERKEY additionally requires issuing a BIOS update + reboot</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585383</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 14:28:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585383</guid>
		<description><![CDATA[”Uudet pohjat” – Linus Torvalds tylyttää AMD-aukon löytäjiä todella rajusti
https://www.is.fi/digitoday/tietoturva/art-2000005605980.html?ref=rss]]></description>
		<content:encoded><![CDATA[<p>”Uudet pohjat” – Linus Torvalds tylyttää AMD-aukon löytäjiä todella rajusti<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000005605980.html?ref=rss" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000005605980.html?ref=rss</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1585363</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 12:41:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1585363</guid>
		<description><![CDATA[CTS Labs Provides Clarifications on AMD Chip Flaws
https://www.securityweek.com/cts-labs-provides-clarifications-amd-chip-flaws

As a result of massive backlash from the industry, Israel-based security firm CTS Labs has provided some clarifications about the recently disclosed AMD processor vulnerabilities and its disclosure method.

CTS Labs this week published a report providing a brief description of 13 critical vulnerabilities and backdoors found in EPYC and Ryzen processors from AMD. The flaws can allegedly be exploited for arbitrary code execution, bypassing security features, stealing data, helping malware become resilient against security products, and damaging hardware.

The vulnerabilities affect AMD’s Secure Processor, an environment where critical tasks are executed in order to secure the storage and processing of sensitive data and applications. The flaws have been dubbed MASTERKEY, RYZENFALL, FALLOUT and CHIMERA, and exploiting them requires elevated privileges to the targeted machine.

AMD was only notified 24 hours before the vulnerabilities were disclosed, but no technical details have been published in order to prevent exploitation for malicious purposes.

CTS Labs was only launched recently and its founders’ work experience has raised some questions. This, combined with the lack of technical details in the report has made many people doubt that the vulnerabilities exist or that they are as critical as the company claims.

However, Dan Guido, CEO of Trail of Bits, and Alex Ionescu, a reputable researcher and Windows security expert, have confirmed CTS Labs’ findings after reviewing technical information provided by the company. Guido was paid to review the work, but Ionescu said he wasn’t.

CTS Labs has come under fire for not giving AMD time to release patches before its disclosure. A

In response to criticism, CTS Labs CTO Ilia Luk-Zilberman argued that the company’s approach to “responsible disclosure” is more beneficial for the public. 

Luk-Zilberman admitted that CTS should have asked several third-parties to confirm its findings before going public in order to convince everyone that their claims are true.

While the CTO’s argument might make sense, many members of the industry are not convinced, particularly due to CTS’s disclaimer claiming that it may have, “either directly or indirectly, an economic interest in the performance of the securities [of AMD].” There is also the report from Viceroy, which attempts to persuade that “AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries.”

In an update posted on its AMDflaws.com website, CTS claimed that exploitation of the vulnerabilities does not require physical access; executing a file with local admin privileges on the targeted machine is enough.

https://amdflaws.com/]]></description>
		<content:encoded><![CDATA[<p>CTS Labs Provides Clarifications on AMD Chip Flaws<br />
<a href="https://www.securityweek.com/cts-labs-provides-clarifications-amd-chip-flaws" rel="nofollow">https://www.securityweek.com/cts-labs-provides-clarifications-amd-chip-flaws</a></p>
<p>As a result of massive backlash from the industry, Israel-based security firm CTS Labs has provided some clarifications about the recently disclosed AMD processor vulnerabilities and its disclosure method.</p>
<p>CTS Labs this week published a report providing a brief description of 13 critical vulnerabilities and backdoors found in EPYC and Ryzen processors from AMD. The flaws can allegedly be exploited for arbitrary code execution, bypassing security features, stealing data, helping malware become resilient against security products, and damaging hardware.</p>
<p>The vulnerabilities affect AMD’s Secure Processor, an environment where critical tasks are executed in order to secure the storage and processing of sensitive data and applications. The flaws have been dubbed MASTERKEY, RYZENFALL, FALLOUT and CHIMERA, and exploiting them requires elevated privileges to the targeted machine.</p>
<p>AMD was only notified 24 hours before the vulnerabilities were disclosed, but no technical details have been published in order to prevent exploitation for malicious purposes.</p>
<p>CTS Labs was only launched recently and its founders’ work experience has raised some questions. This, combined with the lack of technical details in the report has made many people doubt that the vulnerabilities exist or that they are as critical as the company claims.</p>
<p>However, Dan Guido, CEO of Trail of Bits, and Alex Ionescu, a reputable researcher and Windows security expert, have confirmed CTS Labs’ findings after reviewing technical information provided by the company. Guido was paid to review the work, but Ionescu said he wasn’t.</p>
<p>CTS Labs has come under fire for not giving AMD time to release patches before its disclosure. A</p>
<p>In response to criticism, CTS Labs CTO Ilia Luk-Zilberman argued that the company’s approach to “responsible disclosure” is more beneficial for the public. </p>
<p>Luk-Zilberman admitted that CTS should have asked several third-parties to confirm its findings before going public in order to convince everyone that their claims are true.</p>
<p>While the CTO’s argument might make sense, many members of the industry are not convinced, particularly due to CTS’s disclaimer claiming that it may have, “either directly or indirectly, an economic interest in the performance of the securities [of AMD].” There is also the report from Viceroy, which attempts to persuade that “AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries.”</p>
<p>In an update posted on its AMDflaws.com website, CTS claimed that exploitation of the vulnerabilities does not require physical access; executing a file with local admin privileges on the targeted machine is enough.</p>
<p><a href="https://amdflaws.com/" rel="nofollow">https://amdflaws.com/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1584909</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 14:48:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1584909</guid>
		<description><![CDATA[Everything Surrounding These New AMD Security Allegations Reeks of a Hit Job
https://www.extremetech.com/computing/265582-everything-surrounding-new-amd-security-allegations-reeks-hit-job]]></description>
		<content:encoded><![CDATA[<p>Everything Surrounding These New AMD Security Allegations Reeks of a Hit Job<br />
<a href="https://www.extremetech.com/computing/265582-everything-surrounding-new-amd-security-allegations-reeks-hit-job" rel="nofollow">https://www.extremetech.com/computing/265582-everything-surrounding-new-amd-security-allegations-reeks-hit-job</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1584908</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 14:48:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1584908</guid>
		<description><![CDATA[http://ir.amd.com/news-releases/news-release-details/view-our-corner-street-0]]></description>
		<content:encoded><![CDATA[<p><a href="http://ir.amd.com/news-releases/news-release-details/view-our-corner-street-0" rel="nofollow">http://ir.amd.com/news-releases/news-release-details/view-our-corner-street-0</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1584906</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 14:46:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1584906</guid>
		<description><![CDATA[AMD Flaws Overview
https://www.youtube.com/watch?v=BDByiRhMjVA]]></description>
		<content:encoded><![CDATA[<p>AMD Flaws Overview<br />
<a href="https://www.youtube.com/watch?v=BDByiRhMjVA" rel="nofollow">https://www.youtube.com/watch?v=BDByiRhMjVA</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/14/everything-surrounding-these-new-amd-security-allegations-reeks-of-a-hit-job-extremetech/comment-page-1/#comment-1584843</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 08:36:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176573#comment-1584843</guid>
		<description><![CDATA[AMD stock
https://finance.yahoo.com/quote/AMD/]]></description>
		<content:encoded><![CDATA[<p>AMD stock<br />
<a href="https://finance.yahoo.com/quote/AMD/" rel="nofollow">https://finance.yahoo.com/quote/AMD/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
