Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The things you're missing:

1. This requires root.

2. eBPF also requires root usually. As I understand it it was originally meant to be secure enough to allow unprivileged use but Spectre ruined that and now they've given up on that.



How would Spectre, a timing attack that does not require root, affect whether eBPF is safe to run as root?


It doesn't. Spectre means unprivileged use of eBPF is insecure.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: