CatMerc
Golden Member
- Jul 16, 2016
- 1,114
- 1,153
- 136
https://techreport.com/news/33379/cts-labs-defends-its-public-disclosure-of-amd-vulnerabilities
What he expects: "Alright guys we have 90 days to fix this. Let's just sit on our touchus for 80 days and smoke pot and then only fix a critical vulnerability in the remaining 10 days"
Reality: "We need to get it fixed as fast as possible so we can patch systems against this critical vulnerability and clearly explain the ins and outs so the public is informed and not panic over nothing"
All I see this doing in practice is create rushed out broken patches and public confusion. Which if your goal was stock manipulation - Great!
The author then describes CTS' motivations to publish its findings immediately rather than providing ASMedia and AMD several weeks to work on fixing the problems. His primary argument is that public disclosure forces the vendor to begin work on mitigating the flaws immediately. Luk-Zilberman concludes the letter by saying that his group could have provided its proof-of-concept code to more than one party (in this case, Dan Guido from Trail of Bits) before making its claims public.
What he expects: "Alright guys we have 90 days to fix this. Let's just sit on our touchus for 80 days and smoke pot and then only fix a critical vulnerability in the remaining 10 days"
Reality: "We need to get it fixed as fast as possible so we can patch systems against this critical vulnerability and clearly explain the ins and outs so the public is informed and not panic over nothing"
All I see this doing in practice is create rushed out broken patches and public confusion. Which if your goal was stock manipulation - Great!