feature article
Subscribe Now

Spectre and Meltdown and iPhone Batteries and Henny Penny

The Sky May Not be Falling. Yet.

Last week, we learned of two significant security vulnerabilities in the most common processor architectures, which are now used in just about every digital system on the planet. Our own Jim Turley wrote a great explanation of the problem. Predictably, the world responded with alarm, indignation, and a total lack of actual comprehension. After all – these bugs were launched with a full-on marketing frenzy. These bugs have Logos! A panic swept the tech world unlike anything we had seen since… a few days earlier when Apple “admitted slowing down older iPhones.”

Today’s soundbite-driven culture is heavily dependent upon the technology that five decades of Moore’s Law have suddenly bestowed upon us all. Almost overnight, we have capabilities that humans never dreamt of, and we have quickly hit the point where the human race is unable to adapt fast enough to keep up with the change that technology has brought into our lives. Most of the population is simultaneously both deeply engaged with technology and incapable of grasping any reasonable understanding of how it works.

As engineers, we deal with this constantly – perhaps most often in the form of tech support for our friends and families. If we’re very lucky, we’ve taught them the “before you call me, turn it off and back on again. If that doesn’t fix it, then we’ll talk” rule. But, when it comes to issues such as security, all bets are off. The media – particularly the non-technical media – does a terrible job of explaining security issues in terms the general public can understand. And they have little to no incentive to even try. After all, if they can toss up a headline that portends massive doom, they’re likely to pull a lot more clicks than if their article was titled “Spectre and Meltdown – Not a Very Big Deal.”

To make your article go viral, it helps to have high stakes and a villain. That’s why so much of the early press on Spectre and Meltdown singled out Intel. If the public can be convinced that there’s a deep, dark conspiracy and cover-up behind the issue with nefarious characters in mirror-windowed skyscrapers pulling the strings, outrage (and a whole lotta online ad impressions) will likely ensue. Technology problems are fertile ground for whipping torch mobs into a fantasy-fueled frenzy. The Apple battery “scandal” is a perfect example of this. Apple built technology into the iPhone that extends the useful life of the battery and helps to prevent unexpected shutdowns by slowing down the processor when the voltage sags. But it’s a lot more fun to bill that as “Apple deliberately slows down older iPhones.”

What if we considered Spectre and Meltdown in a much lower-tech context? Let’s say we’ve been selling cars for decades. Those cars have locking doors. Then, suddenly, someone says “Hey, even with the door locked, pretty much anybody can get into any car by throwing a rock through the window.” Yep. This is a true fact. You can try it yourself. (Please use your own car, however.) Now, this security vulnerability isn’t exactly a “bug.” It’s not something that the car companies have been trying to hide from us for years. And it probably doesn’t require an immediate recall of every car ever made. Unlike Spectre and Meltdown, this vulnerability has most certainly been used many times. And, unlike Spectre and Meltdown, this vulnerability doesn’t require extremely specialized skills to exploit. Any six-year-old with a rock can pull it off.

There’s a certain kind of fear that is imparted by the unknown. We have a much greater ability to accept risk and danger when that danger is familiar. This is one of the reasons people can read study after study showing that commercial air travel is far safer than private auto travel, and still harbor a strong fear of flying while hopping into a car without giving it a second thought. Things we don’t understand, and therefore cannot control, seem far scarier than even the most dangerous situations we encounter on a daily basis.

Out of order and speculative execution have been with us for a long time. (Not as long as windows on cars, but stay with me here.) The recently discovered vulnerabilities can be mitigated to a large degree with software patches – albeit with some still-unknown performance penalty. And, as Jim pointed out in his article, the bad guys have to already be inside before even attempting to exploit Spectre or Meltdown. In that way, it’s less like breaking into the car and more like a new way to bust into the glovebox once you’re already in. And, like the glovebox, there’s no guarantee the bad guys will find anything of value even after they’ve used the (as of yet incompletely designed) hack.

This brings us to one of the more important questions about Spectre and Meltdown: with all of the security holes out there in the world, do these vulnerabilities offer any new value to the black hats? Sure, some of your passwords might possibly be hanging out in protected memory. But is a Meltdown exploit the best, easiest, or most economical way to get them? In that way, I see these vulnerabilities as being ubiquitous, but not especially valuable.

A lot of technology concerns fit this mold. As a hobby, I do aerial photography with a quadcopter. I generally keep my flying to very remote areas, and I am careful to avoid behaviors that might upset people nearby. Still, a few times, I’ve had people say “That would be a good way to spy on people, wouldn’t it?” My response is “No, actually, it wouldn’t be. A conventional camera with a telephoto lens would be a good way to spy on people.” The quadcopter brings almost nothing to the party if your goal is “spying on people.” It may seem like a new and exotic tool, but it wouldn’t really advance the capabilities of your average “peeping Tom.” Do Spectre and Meltdown offer any real new capability to cyber criminals? At this point I’m unconvinced.

I predict that Spectre and Meltdown will turn out to be minor speed-bumps in the information security realm. Yes, the sheer breadth of the vulnerability is breathtaking, and the scale of the fix will be similarly monumental, but in the long run, I doubt these two gremlins will amass much of a toll in terms of actual damage done to society. It will be interesting to watch.

2 thoughts on “Spectre and Meltdown and iPhone Batteries and Henny Penny”

  1. One of the predictable reactions was reaching for a lawyer – or my guess is certain lawyers reaching for some clients. Of course – the CEO dumping a shed load of shares doesn’t help!

  2. In 2015 Microsoft unleashed the worst virus upon us !!!

    It was called Windows 10 and it continues to plague the world!

    This program can download, install, and run any program desired by its’ authors (Microsoft) at any time and without the users (your) permission. It sends data back home without your consent. And it will do so over metered connections too!

    My beef…
    On January 9th 2018, Windows 10 performed, without my permission, and over a designated metered connection, a download to update my laptop to the latest version so that it could then follow with a download to install security updates. Then it required me to run those unauthorised updates before I could power down my laptop. I was not given any choice, just power down after installing updates, or restart after installing updates. No “remind me later” alternatives! The installation took approximately 30 minutes, and I was not able to use my laptop at all during this time.

    To make matters worse, during the startup part of the installation, something failed and a short message flashed by saying “Windows is performing a rollback”. I did not notice this until Windows had performed this loop of downloading/installing/rollback (on my metered connection) at least 3 times.

    A friend found a microsoft script that was supposed to fix this type of problem, but you guessed it, it didn’t work.

    This loop continues whenever I have used my laptop since then. I think it’s on a 6th or 7th loop, continually wasting my precious limited download quote (over my mobile phone data – I don’t have a landline or adsl/nbn). Once I go over my limit it costs me $10/1GB. Last time I let windows perform an update over my metered link (by unsetting the metered option) it ran over my limit by 6GB causing me a $60 charge.

    There can be no other excuses for Microsoft. This is the very definition of a VIRUS. It takes over your computer, runs malicious code, and sends your private data home. You have absolutely no control of this situation, other than to remove your computer from the internet, at which time your computer is usually unusable.

    This is far worse than the possible results of Meltdown and Spectre. I am losing way more than 30% !!!

    And there is no easy support to fix the problem.
    I now have a ubuntu linux laptop on the way.

Leave a Reply

featured blogs
Sep 19, 2023
What's new with the latest Bluetooth mesh specification? Explore mesh 1.1 features that improve security and network efficiency, reduce power, and more....
Sep 20, 2023
Qualcomm FastConnect Software Suite for XR empowers OEMs with system-level optimizations for truly wireless XR....
Sep 20, 2023
The newest version of Fine Marine offers critical enhancements that improve solver performances and sharpen the C-Wizard's capabilities even further. Check out the highlights: γ-ReθTransition Model and Extension for Crossflow Modeling We have boosted our modeling capabi...
Sep 20, 2023
ESD protection analysis is a critical step in the IC design process; see how our full-chip PrimeESD tool accelerates ESD simulation and violation reporting.The post New Unified Electrostatic Reliability Analysis Solution Has Your Chip Covered appeared first on Chip Design...
Sep 10, 2023
A young girl's autobiography describing growing up alongside the creation of the state of Israel...

featured video

TDK PowerHap Piezo Actuators for Ideal Haptic Feedback

Sponsored by TDK

The PowerHap product line features high acceleration and large forces in a very compact design, coupled with a short response time. TDK’s piezo actuators also offers good sensing functionality by using the inverse piezo effect. Typical applications for the include automotive displays, smartphones and tablet.

Click here for more information about PowerHap Piezo Actuators

featured paper

Accelerating Monte Carlo Simulations for Faster Statistical Variation Analysis, Debugging, and Signoff of Circuit Functionality

Sponsored by Cadence Design Systems

Predicting the probability of failed ICs has become difficult with aggressive process scaling and large-volume manufacturing. Learn how key EDA simulator technologies and methodologies enable fast (minimum number of simulations) and accurate high-sigma analysis.

Click to read more

featured chalk talk

E-Mobility - Charging Stations & Wallboxes AC or DC Charging?
In this episode of Chalk Talk, Amelia Dalton and Andreas Nadler from Würth Elektronik investigate e-mobility charging stations and wallboxes. We take a closer look at the benefits, components, and functions of AC and DC wallboxes and charging stations. They also examine the role that DC link capacitors play in power conversion and how Würth Elektronik can help you create your next AC and DC wallbox or charging station design.
Jul 12, 2023