• GlitterInfection@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    6 months ago

    This requires local access to do and presently an hour or two of uninterrupted processing time on the same cpu as the encryption algorithm.

    So if you’re like me, using an M-chip based device, you don’t currently have to worry about this, and may never have to.

    On the other hand, the thing you have to worry about has not been patched out of nearly any algorithm:

    https://xkcd.com/538/

    • mox@lemmy.sdf.orgOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      6 months ago

      The second comment on the page sums up what I was going to point out:

      I’d be careful making assumptions like this ; the same was true of exploits like Spectre until people managed to get it efficiently running in Javascript in a browser (which did not take very long after the spectre paper was released). Don’t assume that because the initial PoC is time consuming and requires a bunch of access that it won’t be refined into something much less demanding in short order.

      Let’s not panic, but let’s not get complacent, either.