summaryrefslogtreecommitdiff
path: root/Readme.txt
diff options
context:
space:
mode:
authorJeffrey Walton <noloader@gmail.com>2019-06-15 06:42:34 -0400
committerJeffrey Walton <noloader@gmail.com>2019-06-15 06:42:34 -0400
commit26a59cd94b854399b8c9516169532bb939e8728d (patch)
tree2bffafc4b1ee6935edfc36353623f5f5b3969382 /Readme.txt
parent840bc65740415a8d2ad204b739c42df13e3c2362 (diff)
downloadcryptopp-git-26a59cd94b854399b8c9516169532bb939e8728d.tar.gz
Update README
Diffstat (limited to 'Readme.txt')
-rw-r--r--Readme.txt6
1 files changed, 4 insertions, 2 deletions
diff --git a/Readme.txt b/Readme.txt
index 7f82ec08..a5d62bad 100644
--- a/Readme.txt
+++ b/Readme.txt
@@ -208,7 +208,8 @@ library in your programs to help avoid unwanted redirections.
Crypto++ attempts to resist side channel attacks using various remediations.
The remdiations are applied as a best effort but are probably incomplete. They
are incomplete due to cpu speculation bugs like Spectre, Meltdown, Foreshadow.
-Intel generally refers to them as "Microarchitectural Data Sampling" (MDS).
+The attacks target both cpu caches and internal buffers. Intel generally refers
+to internal buffer attacks as "Microarchitectural Data Sampling" (MDS).
The library uses hardware instructions when possible for block ciphers, hashes
and other operations. The hardware acceleration remediates some timing
@@ -225,7 +226,8 @@ for Specter are -mfunction-return=thunk and -mindirect-branch=thunk, and the
library uses them during testing. If you want the Specter workarounds then add
the GCC options to your CXXFLAGS when building the library.
-If you suspect or find an information leak then please report it.
+To help resist attacks you should disable hyperthreading on cpus. If you
+suspect or find an information leak then please report it.
*** Documentation and Support ***