@stman @Pervertor Rowhammer & Nethammer suppose compromised software. Reread your paper please…

@stman @Pervertor And nethammer suppose a way to send custom flow to the targeted people. Such attack is highly visible from the network point of view (500Mbps throughput)


@stman @Pervertor And efficiency of nethammer is quite low : 1 (random) bit flip each 350ms with a 500Mbps flow… Just unusable in practice to expect any communication or data exfiltration…

Sign in to participate in the conversation

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!