Hacker News new | past | comments | ask | show | jobs | submit login

I'm curious as to whether the techniques used here are safe against Spectre-like attacks. There appears to be a heavy reliance on indirect branching. The slides here are dated just before Spectre was published, so it would not have been a concern at the time.



>I'm curious as to whether the techniques used here are safe against Spectre-like attacks

Because people will be compromising your GNU poke or Jitter code?


Not poke per se, but Jitter is intended to be a retargetable interpreter for other programming languages, so maybe.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: