Mozilla:
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
"(...) Our internal experiments confirm that it is possible to use similar techniques from Web content to read private information between different origins.
(...)
The resolution of performance.now() will be reduced to 20µs.
The SharedArrayBuffer feature is being disabled by default.
Furthermore, other timing sources and time-fuzzing techniques are being worked on."
@rysiek this is good? Too technical for my brain right now.
@maloki it's... what it is. Mozilla confirms that Spectre/Meltdown are exploitable via JS in a browser. And working on some fixes.
@rysiek this is good? Too technical for my brain right now.