SoylentNews first reported the vulnerabilities on January 3. Since then, we have had a few stories addressing different reports about these vulnerabilities. Now that it is over two weeks later and we are *still* dealing with reboots, I am curious as to what our community's experience has been.
What steps have you taken, if any, to deal with these reports? Be utterly proactive and install every next thing that comes along? Do a constrained roll out to test a system or two before pushing out to other systems? Wait for the dust to settle before taking any steps?
What providers (system/os/motherboard/chip) have been especially helpful... or non-helpful? How has their response affected your view of that company?
What resources have you been using to check on the status of fixes for your systems? Have you found a site that stands above the others in timeliness and accuracy?
How has this affected your purchasing plans... and your expectations on what you could get for selling your old system? Are you now holding off on purchasing something new?
(Score: 2) by acid andy on Friday January 19 2018, @02:14PM (3 children)
I like this approach, so long as the upload machine doesn't have write access to the media (or the media is never reinserted in the secure machine) although maybe on Linux this is less of a worry than Windows. DVDR / CDR would do it.
If a cat has kittens, does a rat have rittens, a bat bittens and a mat mittens?
(Score: 5, Funny) by fyngyrz on Friday January 19 2018, @02:23PM (2 children)
Yes. CD-R is exactly how I do it. I have cases of the things. So far, they all write just fine, and once used, they're tossed. Eventually I'll run out, and/or they'll probably stop making them, but I'll probably croak or at least quit writing software first. One of the (very few) benefits of being old. :)
(Score: 1, Offtopic) by Bot on Friday January 19 2018, @04:12PM (1 child)
You might want to investigate rewritable CDRs.
Account abandoned.
(Score: 2, Informative) by Anonymous Coward on Friday January 19 2018, @06:37PM
If you read, the disposability is considered a feature, as they act as a data diode.
There also exist data diodes that allow realtime pushing of data:
http://www.waterfall-security.com/wp-content/uploads/2012/02/Securing-Critical-Cyber-Assets-with-Data-Diodes.pdf [waterfall-security.com]