<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 11:38:28 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Amd Platform Security Processor”</title>
    <link>https://techsnap.systems/tags/amd%20platform%20security%20processor</link>
    <pubDate>Thu, 22 Mar 2018 12:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 360: AMD Flaws Explained</title>
  <link>https://techsnap.systems/360</link>
  <guid isPermaLink="false">2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9</guid>
  <pubDate>Thu, 22 Mar 2018 12:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9.mp3" length="21507018" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</itunes:subtitle>
  <itunes:duration>29:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..
Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup. 
</description>
  <content:encoded>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
