AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Exploring Vulnerabilities and Evolution of Microprocessors
This chapter discusses the vulnerabilities in modern microprocessors, such as Meltdown and Spectre, and how attackers exploit side channels and caches. It also explores the evolution of processors from older machines like the ICL 286 and touches on the importance of permission checks in computer architecture. Additionally, it reflects on personal experiences with computers, including nostalgic anecdotes from high school and early childhood introductions to programming.
You can find Jon on Twitter at https://twitter.com/jonmasters.
Some of the highlights of the show include:
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode