Just watched this
https://www.youtube.com/watch?v=KrksBdWcZgQ&index=1&list=FLbt8HQLdqMdy2tKsIE64NkA
And I was wondering what potential uses could hidden instructions have for security of data? Could you syphon data out of your cpu cache to the internet, right?
>>62322223
Yeah, but there is more to that than just NSA spying. There are hundreds of undocumented features and I don't think you need that many for surveillance, which makes me wonder: What are those for exactly?
>>62322223
>22223
so close
>>62322278
Maybe it's just hardware crust. Remaints of a prototype? They don't have to be all malicious, come could be just useless due to human error.
>>62322322
I wonder if some of them are usable for hobbyist bullshit or optimization.
>>62322223
neat