After our analysis about the vulnerability disclosures this week on AnandTech, and continuing discussions on Twitter, TechTeamGB, a Great Britain based Youtube technology channel, invited Senior Editor Ian Cutress on the Thursday show to discuss the recent news surrounding the AMDFlaws website, the ramifications of the announcement, the company behind the announcement, and what it means to the community at large.

Through the 96 minute discussion, Ian vocalised a lot of what has been covered on AnandTech already, and discussed some of the more esoteric claims in the wild that may or may not have elements of truth in them. This show was broadcast before posting our interesting call with CTS-Labs, the company behind the vulnerability disclosure, but has a number of snippets that are mirrored in that article.

A small Q&A from the TechTeamGB audience happens at the end of the show. The show is hosted by TechTeamGB Host, Andrew McDonald.

If you prefer your content in audio and video form, here it is.

Related Reading

Comments Locked

14 Comments

View All Comments

  • SaolDan - Friday, March 16, 2018 - link

    So thats what he looks like!!
  • Ian Cutress - Friday, March 16, 2018 - link

    I would say I have my photo on Twitter, but it's now the bunny suit photo from the GloFo tour.
  • ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - link

    ....and to our left is Nathan from Southpark
  • ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - link

    lookin Good Mimsyyy

    You lose weight?
  • lashek37 - Friday, March 16, 2018 - link

    That’s what he look like🤷🏽‍♂️🌹❤️
  • Hurr Durr - Friday, March 16, 2018 - link

    Um Yeah Um Um Yeah Um
  • Alexvrb - Friday, March 16, 2018 - link

    Forgot your meds again, I see.
  • Hurr Durr - Saturday, March 17, 2018 - link

    Mouthbreather triggered, good.
  • TesseractOrion - Sunday, March 18, 2018 - link

    Hurr Durr - the talking twat that just HAS to write something, ANYTHING (as long as it's pointless and retarded) in Anandtech's comments: as it's the only thing he has to do all day...
  • DrizztVD - Friday, March 16, 2018 - link

    I have a tiny bit of experience in the computer security field. It usually irritated me how people would find ways to believe things that happen to help their pockets at the same time. You'd commonly hear a guy in the office saying something like: "I broke the system's security wiiiide open". Then, our red team guys, who would actually get paid to infiltrate a company right rough to the CEO's emails, would usually have a much more muted response. They know: only 1% of claimed "blow security right open" exploits actually end up suiting their needs. They run 1000s of exploits over more than a month to crack the system. Do you know what they do with the opened system then? They use it to build an internal employee/manager map so that they know who has the most valuable information in the company. Then, they will do a phishing attack on non-technical personal who have access to the end prize (CEO emails, or company account access, etc.) Any red team attack is 80% social engineering.

Log in

Don't have an account? Sign up now