Showing posts with label Intel. Show all posts
Showing posts with label Intel. Show all posts


Intel would possibly be about to take yet some other crushing blow to its processor commercial enterprise as Apple seems to be slowly (but surely) inching nearer toward ditching its chips.

The Cupertino behemoth is planning to begin promoting computer systems with its very own ARM-based processors as early as 2021Bloomberg reports. The new chips will be based totally on the equal designs underpinning the iPhone and the iPad, in accordance to sources acquainted with the matter.
Apple is growing three of its very own processors — recognized as systems-on-a-chip — primarily based on the A14 processors slated to electricity the subsequent iPhone. At least one of these will be drastically snappier than these in the iPhone and the iPad, the document suggests.

The enterprise hopes to roll out at least one Mac with its very own processor subsequent year, however the improvement of more than one fashions suggests Apple is planning to pass away different gadgets in its Mac lineup away from Intel technology. The chips will depend on a 5-nanometer structure (similar to what’s observed interior the iPhone and the iPad pro), and will be producer by means of TSMC.

Apple’s processors will purportedly come as self-contained units, providing each a CPU and a GPU. In some cases, they’re anticipated to double (and even quadruple) the quantity of cores in its modern Intel-powered Macs.

The technological know-how is stated to be counted on a aggregate of high-performance processing gadgets for intensive tasks, and extra energy-efficient gadgets for low-power duties — in a similar fashion to how the iPhone chips are designed.

Rumors about Apple diving into the laptop processor market have circulated for a few years now. Back in 2018, mentioned Apple analyst Ming-Chi Kuo first speculated the iPhone-maker should drop a Mac with an in-house chip as early as 2020.

Aside from lowering reliability on different companies, one of Apple’s predominant motivations at the back of creating its personal processors is that Intel has struggled to supply the each year enhance in overall performance it as soon as did.

If that wasn’t enough, Intel has already been dropping ground to competitor AMD, whose computing device CPU choices supply higher overall performance for much less money. More worryingly, AMD has additionally began catching up — and arguably even taking the lead — when it comes to cell CPU performance.

While many laptop computer producers proceed to count on Intel processors, extra organizations are making the change to AMD, which includes Microsoft which launched a Ryzen-powered Surface laptop computer until now this year.

Even worse, Apple is additionally gearing up to go away at the back of Intel’s cell modem technological know-how used in the iPhone in desire of Qualcomm’s 5G alternative.

While Bloomberg suggests Apple’s inaugural processors won’t attain Intel-tier overall performance in higher-end models, the agency stays assured it can leapfrog Intel’s science in the lengthy run. Whether that will occur stays to be seen.

One aspect looks for certain, though: If Apple’s foray into laptop processors succeeds, Intel’s business is destined to suffer.

Researchers discover that Intel chips have an unfixable security flaw

Security researchers have discovered another flaw in recent Intel chips that, while difficult to exploit, is completely unpatchable. The vulnerability is within Intel's Converged Security and Management Engine (CSME), a part of the chip that controls system boot-up, power levels, firmware and, most critically, cryptographic functions. Security specialists Positive Technologies have found that a tiny gap in security in that module that could allow attackers to inject malicious code and, eventually, commandeer your PC.The vulnerability is another in a string of Intel chip flaws that have damaged the chipmaker's reputation of late. In 2018, Intel faced heavy criticism over the Meltdown and Spectre flaws in Intel chips that could have allowed attackers to steal data.
CSME, which has its own 486-based CPU, RAM and boot ROM, is the first thing that runs when you boot up your computer. One of the first things it does is protect its own memory, but before that happens, there's a brief moment when it's vulnerable. If hackers have local or physical access to a machine, they might be able to fire off a DMA transfer to that RAM, overwriting it and hijacking code execution.
Since the boot code and RAM are hard coded into Intel's CPUs, they can't be patched or reset without replacing the silicon. That makes it impossible for Intel or computer makers to mitigate, let alone completely fix, the vulnerability.
The CSME's security functions allow the operating system and apps to securely store file encryption keys using a master "chipset key." If an attacker could access that key by executing malicious code, they could gain access to core parts of the operating system along with apps, and potentially do serious damage.
"This [chipset] key is not platform-specific. A single key is used for an entire generation of Intel chipsets," explains Mark Ermolov from Positive Technologies. "And since... the ROM vulnerability cannot be fixed, we believe that extracting this key is only a matter of time. When this happens, utter chaos will reign. Hardware IDs will be forged, digital content will be extracted, and data from encrypted hard disks will be decrypted."
That sounds dramatic, but exploiting the vulnerability would require major technological know-how, specialized equipment and physical access to a machine. Once hackers were inside a system, though, they could feasibly gain persistent remote access.
The vulnerability applies to machines with Intel chips built over the last five years or so. Intel said that it was notified of the vulnerabilities and released mitigations in May 2019 to be incorporated into firmware updates for motherboards and computer systems.
The chip giant told Ars Technica on background that those updates "should" mitigate local attacks. However, physical attacks (where attackers have possession of a targeted computer) might still be possible if attackers can roll back BIOS versions. As such, Intel said in a support document that "end users should maintain physical possession of their platforms.'