[...] Recently, security researchers have found that some innovations have let secrets flow freely out of computer hardware the same way software vulnerabilities have led to cyberattacks and data breaches. The best known recent examples were the chip flaws nicknamed Spectre and Meltdown that affected billions of computers, smartphones and other electronic devices. On July 10, researchers announced they discovered new variants of those flaws exploiting the same fundamental leaks in the majority of microprocessors manufactured within the last 20 years.
This realization has led to calls from microchip industry leaders, including icons John Hennessy and David Patterson, for a complete rethinking of computer architecture to put security first. I have been a researcher in the computer architecture field for 15 years – as a graduate student and professor, with stints in industry research organizations – and conduct research in power-management, microarchitecture and security. It's not the first time designers have had to reevaluate everything they were doing. However, this awakening requires a faster and more significant change to restore users' trust in hardware security without ruining devices' performance and battery life.
Is Open Hardware the answer?
(Score: 3, Interesting) by bob_super on Thursday July 19 2018, @10:07PM
I remember dealing with .mil customers, who would listen to our tech/sales info, excuse themselves to go read some classified NSA memo about our security flaws, and then quietly decide whether to buy from something else.
For all its flaws, the NSA has been hitting manufacturers with insufficient security at the wallet. For lack of a Clearance, I couldn't say how long the list was, compared to our competitors. But I know for a fact that the major .mil suppliers have been putting the pressure. And they buy at some attention-grabbing margins.