feature article
Subscribe Now

Spectre and Meltdown and iPhone Batteries and Henny Penny

The Sky May Not be Falling. Yet.

Last week, we learned of two significant security vulnerabilities in the most common processor architectures, which are now used in just about every digital system on the planet. Our own Jim Turley wrote a great explanation of the problem. Predictably, the world responded with alarm, indignation, and a total lack of actual comprehension. After all – these bugs were launched with a full-on marketing frenzy. These bugs have Logos! A panic swept the tech world unlike anything we had seen since… a few days earlier when Apple “admitted slowing down older iPhones.”

Today’s soundbite-driven culture is heavily dependent upon the technology that five decades of Moore’s Law have suddenly bestowed upon us all. Almost overnight, we have capabilities that humans never dreamt of, and we have quickly hit the point where the human race is unable to adapt fast enough to keep up with the change that technology has brought into our lives. Most of the population is simultaneously both deeply engaged with technology and incapable of grasping any reasonable understanding of how it works.

As engineers, we deal with this constantly – perhaps most often in the form of tech support for our friends and families. If we’re very lucky, we’ve taught them the “before you call me, turn it off and back on again. If that doesn’t fix it, then we’ll talk” rule. But, when it comes to issues such as security, all bets are off. The media – particularly the non-technical media – does a terrible job of explaining security issues in terms the general public can understand. And they have little to no incentive to even try. After all, if they can toss up a headline that portends massive doom, they’re likely to pull a lot more clicks than if their article was titled “Spectre and Meltdown – Not a Very Big Deal.”

To make your article go viral, it helps to have high stakes and a villain. That’s why so much of the early press on Spectre and Meltdown singled out Intel. If the public can be convinced that there’s a deep, dark conspiracy and cover-up behind the issue with nefarious characters in mirror-windowed skyscrapers pulling the strings, outrage (and a whole lotta online ad impressions) will likely ensue. Technology problems are fertile ground for whipping torch mobs into a fantasy-fueled frenzy. The Apple battery “scandal” is a perfect example of this. Apple built technology into the iPhone that extends the useful life of the battery and helps to prevent unexpected shutdowns by slowing down the processor when the voltage sags. But it’s a lot more fun to bill that as “Apple deliberately slows down older iPhones.”

What if we considered Spectre and Meltdown in a much lower-tech context? Let’s say we’ve been selling cars for decades. Those cars have locking doors. Then, suddenly, someone says “Hey, even with the door locked, pretty much anybody can get into any car by throwing a rock through the window.” Yep. This is a true fact. You can try it yourself. (Please use your own car, however.) Now, this security vulnerability isn’t exactly a “bug.” It’s not something that the car companies have been trying to hide from us for years. And it probably doesn’t require an immediate recall of every car ever made. Unlike Spectre and Meltdown, this vulnerability has most certainly been used many times. And, unlike Spectre and Meltdown, this vulnerability doesn’t require extremely specialized skills to exploit. Any six-year-old with a rock can pull it off.

There’s a certain kind of fear that is imparted by the unknown. We have a much greater ability to accept risk and danger when that danger is familiar. This is one of the reasons people can read study after study showing that commercial air travel is far safer than private auto travel, and still harbor a strong fear of flying while hopping into a car without giving it a second thought. Things we don’t understand, and therefore cannot control, seem far scarier than even the most dangerous situations we encounter on a daily basis.

Out of order and speculative execution have been with us for a long time. (Not as long as windows on cars, but stay with me here.) The recently discovered vulnerabilities can be mitigated to a large degree with software patches – albeit with some still-unknown performance penalty. And, as Jim pointed out in his article, the bad guys have to already be inside before even attempting to exploit Spectre or Meltdown. In that way, it’s less like breaking into the car and more like a new way to bust into the glovebox once you’re already in. And, like the glovebox, there’s no guarantee the bad guys will find anything of value even after they’ve used the (as of yet incompletely designed) hack.

This brings us to one of the more important questions about Spectre and Meltdown: with all of the security holes out there in the world, do these vulnerabilities offer any new value to the black hats? Sure, some of your passwords might possibly be hanging out in protected memory. But is a Meltdown exploit the best, easiest, or most economical way to get them? In that way, I see these vulnerabilities as being ubiquitous, but not especially valuable.

A lot of technology concerns fit this mold. As a hobby, I do aerial photography with a quadcopter. I generally keep my flying to very remote areas, and I am careful to avoid behaviors that might upset people nearby. Still, a few times, I’ve had people say “That would be a good way to spy on people, wouldn’t it?” My response is “No, actually, it wouldn’t be. A conventional camera with a telephoto lens would be a good way to spy on people.” The quadcopter brings almost nothing to the party if your goal is “spying on people.” It may seem like a new and exotic tool, but it wouldn’t really advance the capabilities of your average “peeping Tom.” Do Spectre and Meltdown offer any real new capability to cyber criminals? At this point I’m unconvinced.

I predict that Spectre and Meltdown will turn out to be minor speed-bumps in the information security realm. Yes, the sheer breadth of the vulnerability is breathtaking, and the scale of the fix will be similarly monumental, but in the long run, I doubt these two gremlins will amass much of a toll in terms of actual damage done to society. It will be interesting to watch.

2 thoughts on “Spectre and Meltdown and iPhone Batteries and Henny Penny”

  1. One of the predictable reactions was reaching for a lawyer – or my guess is certain lawyers reaching for some clients. Of course – the CEO dumping a shed load of shares doesn’t help!

  2. In 2015 Microsoft unleashed the worst virus upon us !!!

    It was called Windows 10 and it continues to plague the world!

    This program can download, install, and run any program desired by its’ authors (Microsoft) at any time and without the users (your) permission. It sends data back home without your consent. And it will do so over metered connections too!

    My beef…
    On January 9th 2018, Windows 10 performed, without my permission, and over a designated metered connection, a download to update my laptop to the latest version so that it could then follow with a download to install security updates. Then it required me to run those unauthorised updates before I could power down my laptop. I was not given any choice, just power down after installing updates, or restart after installing updates. No “remind me later” alternatives! The installation took approximately 30 minutes, and I was not able to use my laptop at all during this time.

    To make matters worse, during the startup part of the installation, something failed and a short message flashed by saying “Windows is performing a rollback”. I did not notice this until Windows had performed this loop of downloading/installing/rollback (on my metered connection) at least 3 times.

    A friend found a microsoft script that was supposed to fix this type of problem, but you guessed it, it didn’t work.

    This loop continues whenever I have used my laptop since then. I think it’s on a 6th or 7th loop, continually wasting my precious limited download quote (over my mobile phone data – I don’t have a landline or adsl/nbn). Once I go over my limit it costs me $10/1GB. Last time I let windows perform an update over my metered link (by unsetting the metered option) it ran over my limit by 6GB causing me a $60 charge.

    There can be no other excuses for Microsoft. This is the very definition of a VIRUS. It takes over your computer, runs malicious code, and sends your private data home. You have absolutely no control of this situation, other than to remove your computer from the internet, at which time your computer is usually unusable.

    This is far worse than the possible results of Meltdown and Spectre. I am losing way more than 30% !!!

    And there is no easy support to fix the problem.
    I now have a ubuntu linux laptop on the way.

Leave a Reply

featured blogs
May 7, 2021
In one of our Knowledge Booster Blogs a few months ago we introduced you to some tips and tricks for the optimal use of Virtuoso ADE Product Suite with our analog IC design videos . W e hope you... [[ Click on the title to access the full blog on the Cadence Community site. ...
May 7, 2021
Enough of the letter “P” already. Message recieved. In any case, modeling and simulating next-gen 224 Gbps signal channels poses many challenges. Design engineers must optimize the entire signal path, not just a specific component. The signal path includes transce...
May 6, 2021
Learn how correct-by-construction coding enables a more productive chip design process, as new code review tools address bugs early in the design process. The post Find Bugs Earlier Via On-the-Fly Code Checking for Productive Chip Design and Verification appeared first on Fr...
May 4, 2021
What a difference a year can make! Oh, we're not referring to that virus that… The post Realize Live + U2U: Side by Side appeared first on Design with Calibre....

featured video

Introduction to EMI

Sponsored by Texas Instruments

Conducted versus radiated EMI. CISPR-25 and CISPR-32 standards. High-frequency or low-frequency emissions. Designing a system to reduce EMI can be overwhelming, but it doesn’t have to be. Watch this video to get an overview of EMI causes, standards, and mitigation techniques.

Click here for more information

featured paper

Compact. Precise. Connected. Increase productivity with intelligent edge computing.

Sponsored by Texas Instruments

Smart devices in factories and buildings are getting smaller and more capable, with enhanced real-time control, robust connectivity, and configurable web services. Read about new processor technology that is unleashing the true potential of Industry 5.0 and the Internet of Things.

Click here to read more

Featured Chalk Talk

Next Generation Connectivity and Control Concepts for Industry 4.0

Sponsored by Mouser Electronics and Molex

Industry 4.0 promises major improvements in terms of efficiency, reduced downtime, automation, monitoring, and control. But Industry 4.0 also demands a new look at our interconnect solutions. In this episode of Chalk Talk, Amelia Dalton chats with Mark Schuerman of Molex about Industry 4.0 and how to choose the right connectors for your application.

Click here for more information about Molex Industry 4.0 Solutions