SoylentNews first reported the vulnerabilities on January 3. Since then, we have had a few stories addressing different reports about these vulnerabilities. Now that it is over two weeks later and we are *still* dealing with reboots, I am curious as to what our community's experience has been.
What steps have you taken, if any, to deal with these reports? Be utterly proactive and install every next thing that comes along? Do a constrained roll out to test a system or two before pushing out to other systems? Wait for the dust to settle before taking any steps?
What providers (system/os/motherboard/chip) have been especially helpful... or non-helpful? How has their response affected your view of that company?
What resources have you been using to check on the status of fixes for your systems? Have you found a site that stands above the others in timeliness and accuracy?
How has this affected your purchasing plans... and your expectations on what you could get for selling your old system? Are you now holding off on purchasing something new?
(Score: 1, Offtopic) by Bot on Friday January 19 2018, @04:12PM (1 child)
You might want to investigate rewritable CDRs.
Account abandoned.
(Score: 2, Informative) by Anonymous Coward on Friday January 19 2018, @06:37PM
If you read, the disposability is considered a feature, as they act as a data diode.
There also exist data diodes that allow realtime pushing of data:
http://www.waterfall-security.com/wp-content/uploads/2012/02/Securing-Critical-Cyber-Assets-with-Data-Diodes.pdf [waterfall-security.com]