Did this coupon
work for you?
work for you?
Rating: | (4.6 out of 5 stars) |
Reviews: | 11 Amazon Reviews |
Product Name: | Apple 2024 MacBook Air 13-inch Laptop with M3 chip: 13.6-inch Liquid Retina Display, 8GB Unified Memory, 256GB SSD Storage, Backlit Keyboard, 1080p FaceTime HD Camera, Touch ID; Midnight |
Manufacturer: | Apple |
Model Number: | MRXV3LL/A |
Product SKU: | B0CX23V2ZK |
UPC: | 195949126994 |
The link has been copied to the clipboard.
62 Comments
Your comment cannot be blank.
Featured Comments
"Fortunately, it seems the attack is pretty difficult to pull off"
To note, TechRadar is awful at explaining how the 99.9% of the world is unaffected. I'm nowhere near an expert in this area but....this is so far removed from normal life that you'd almost need to be a willing participant and have already given up control of your device. It's not like someone can just sit next to you and siphon it out like in the movies.
Sign up for a Slickdeals account to remove this ad.
And, how exactly are they getting into your machine to run this 'remote software' in the first place, without you giving them access? If you are downloading crapware from shady sites and running them under an admin/root account, you have far greater issues than this vulnerability!
I have a M1 Mac Mini with 8GB RAM. I use it for surfing, occasionally editing RAW files from my DSLR in Affinity Photo and I have never found it sluggish. It definitely feels snappier than my Dell Precision Laptop with i7 Pro and 32 GB RAM from work. Now granted that my Dell Precision has anti virus and encryption enabled due to work.
Not that it was great to start with.
It's funny, people have Hollywood like impression of hackers. These attacks require multiple brute force tries (timing and side channel attacks) to retrieve anything that can compromise the security (encryption, authentication, authorization or repudiation). Most common high level programs have number of retries built in before they will lock you out from performing sensitive operations.
M3 processor has a switch that you can enable to turn off prefetching and it helps with constant time processing for crypto operations (for example comparing two data buffer values or compute hash on certain size of data). Constant time operation thwarts the attack that has gathered some press. M1 and M2 don't have that switch and may have to rely on additional proofing to avoid side channel leakage.
To be honest 99% of folks would just be fine even with M1 and M2. The attacker needs multiple things go their way before they can do anything useful and probability of all of them going attackers way is near zero (if you understand how probabilities work).
There is a nice article : https://www.zetter-zeroday.com/apple-chips/ which is much more informative. It requires some computer architecture background for the reader.
Source: I am an information security researcher and PhD student at Georgia Tech.
Sign up for a Slickdeals account to remove this ad.
M3 processor has a switch that you can enable to turn off prefetching and it helps with constant time processing for crypto operations (for example comparing two data buffer values or compute hash on certain size of data). Constant time operation thwarts the attack that has gathered some press. M1 and M2 don't have that switch and may have to rely on additional proofing to avoid side channel leakage.
To be honest 99% of folks would just be fine even with M1 and M2. The attacker needs multiple things go their way before they can do anything useful and probability of all of them going attackers way is near zero (if you understand how probabilities work).
There is a nice article : https://www.zetter-zeroday.com/apple-chips/ which is much more informative. It requires some computer architecture background for the reader.
Source: I am an information security researcher and PhD student at Georgia Tech.
Source: [{insert personal anecdote relating to your post}]
It is a common convention used here when folks want to share their experience. It is stylistically used in place of: "Hi, in my experience after n-years of dealing with X… "
This is the internet, you are encouraged to fact check and look at everything with skepticism! But don't hate on the comment because you are not used to the "style of the post."
Source: long-time lurker, excited about deals and not a fan of thread crapping.
I have a MBA 13" M2 and it's great with 8gb RAM.. but 512GB is def minimum for my use case, wish they brought back the wedge shape.
Bub
Sign up for a Slickdeals account to remove this ad.
Sorry to correct you but some malware can be installed without physical access to the device. They can be sent to the victim's device through a very specific targeted attacks. It often needs one misstep, some trigger or victim initiating an action like visiting a malicious website or downloading an attachment from what looks like a perfectly legal email, using a shared usb drive, accessing file from network share. There are many creative ways to craft and inject a malware remotely. For example, someone reading your post and if they have found your personal email through some web-scraping might craft a very nice notification email that might seem like have originated from SlickDeal, and might say user x has replied to your comment. Since you were on the thread, you wouldn't suspect it as much and might be lured into clicking the link. This is an example of a targeted attack.