AMD says some chips fall outside of the software support window.

Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

That’s so stupid, also because they have fixes for Zen and Zen 2 based Epyc CPUs available.

Intel vs. AMD isn’t “bad guys” vs. “good guys”. Either company will take every opportunity to screw their customers over. Sure, “don’t buy Intel” holds true for 13th and 14th gen Core CPUs specifically, but other than that it’s more of a pick your poison.

haui
link
fedilink
English
611M

Tangent: If we started buying risc-v systems we might get to a point where they can actually compete.

PrivateNoob
link
fedilink
English
471M

That’s still far away from us as a consumer standpoint, but I’m eagerly waiting for a time when I could buy a RISC V laptop with atleast midrange computing capabalities

haui
link
fedilink
English
71M

I‘m more on the builder/tinkerer side so I‘m pretty much in starting position with risc-v now. But yes, its going to be some time before any of it is user ready as a pc.

@Findmysec@infosec.pub
link
fedilink
English
111M

Framework has a laptop in progress if you’re interested

haui
link
fedilink
English
51M

Indeed I am. I‘m in posession of a working laptop but I could maybe order a riscv tablet from pine64. I already have the pinetime and the stuff is pretty awesome.

@Findmysec@infosec.pub
link
fedilink
English
41M

Well the Star64 from Pine is pretty good, just doesn’t have enough processing power and IO for my liking.

Possibly linux
link
fedilink
English
51M

It is crazy efficient

@narc0tic_bird@lemm.ee
link
fedilink
English
61M

I’m waiting to see how DeepComputing’s RISC-V mainboard for the Framework turns out. I’m aware that this is very much a development platform and far from an actual end-user product, but if the price is right, I might jump in to experiment.

haui
link
fedilink
English
31M

Sounds like a cool idea! :)

Jeff Geerling had a video recently about the state of RISC V for desktop. https://youtu.be/YxtFctEsHy0?si=SUQBiepSeOne8-2u

haui
link
fedilink
English
71M

I really enjoyed watching it. Thanks for referring to it.

Possibly linux
link
fedilink
English
61M

At the rate we are going Qualcomm might pivot to Risc-V (they are being sued by ARM)

haui
link
fedilink
English
21M

Interesting! Thanks for chiming in. I‘ll read up about it.

I’m not buying hardware that doesn’t suit my needs as an investment hoping maybe it eventually will.

Amanda
link
fedilink
English
31M

This is one of the hardest earned lessons I’ve ever learned, and I’ve had to learn it over and over again. I think it’s mostly stuck now but I still make the same mistake from time to time.

haui
link
fedilink
English
11M

Yeah, thats the reason why we‘re in this capitalist hellhole. Perfection comes from billionaire money, nothing else.

What are you talking about perfection?

Buying something that doesn’t function is never rational.

haui
link
fedilink
English
-31M

I’m not buying hardware that doesn’t suit my needs as an investment hoping maybe it eventually will.

You were misrepresenting things. Your needs have nothing to do with things not being functional. Something can be perfectly functional and not meet someones needs. Nobody said you should buy it as an investment.

My interpretation was by far the most generous to your position, because it’s the only way it’s coherent.

If people bought [this hardware that doesn’t actually provide anything anyone can realistically use at a reasonable price] it might eventually not suck. That’s treating a current purchase as an imaginary investment in maybe eventually being able to buy something useful.

haui
link
fedilink
English
-21M

My interpretation was by far the most generous to your position, because it’s the only way it’s coherent.

You’re entitled to your opinion, I guess.

hardware that doesn’t actually provide anything anyone can realistically use

Thats misrepresenting reality and making assumptions while clearly showing lack of expertise

at a reasonable price

Thats completely arbitrary. If a price is reasonable or not depends on many factors. Obvious oversymplification.

That’s treating a current purchase as an imaginary investment in maybe eventually being able to buy something useful.

This shows that you have no idea what you are talking about. Small companies and open source projects depend on people buying their products instead of cheaper, sometimes better performing products of big conglomerates for other reasons than price alone.

@Decipher0771@lemmy.ca
link
fedilink
English
11M

“Both sides”

“Vote third party!”

Wtf seriously this isn’t the same thing remotely but the arguments used are.

@umbrella@lemmy.ml
link
fedilink
English
21M

cmon man

Victor
link
fedilink
English
-391M

How is AMD “screwing us over”? Surely they aren’t doing this on purpose? That seems very cynical.

@Grippler@feddit.dk
link
fedilink
English
67
edit-2
1M

They are 100% not patching old chips intentionally by not allocating resources to it. It’s a conscious choice made by the company, it is very much “on purpose”.

Victor
link
fedilink
English
-121M

That’s not what I was referring to. I was referring to the act of “adding vulnerabilities”. Surely they aren’t doing that on purpose. And surely they would add fixes for it if it was economically viable? It’s a matter of goodwill and reputation, right?

I don’t know, I just don’t think it’s AMD’s business model to “screw over” their customers. I just don’t.

The cost isn’t that high. They’re already doing it for a bunch of parallel systems.

In a just world they’d be legally required to provide the fixes, or fully refund the entire platform cost. It’s not remotely ethical to allow this to exist unpatched anywhere, regardless of support life.

Victor
link
fedilink
English
01M

I agree. 👌

@narc0tic_bird@lemm.ee
link
fedilink
English
261M

What I mean by that is that they will take a huge disservice to their customers over a slight financial inconvenience (packaging and validating an existing fix for different CPU series with the same architecture).

I don’t classify fixing critical vulnerabilities from products as recent as the last decade as “goodwill”, that’s just what I’d expect to receive as a customer: a working product with no known vulnerabilities left open. I could’ve bought a Ryzen 3000 CPU (maybe as part of cheap office PCs or whatever) a few days ago, only to now know they have this severe vulnerability with the label WONTFIX on it. And even if I bought it 5 years ago: a fix exists, port it over!

I know some people say it’s not that critical of a bug because an attacker needs kernel access, but it’s a convenient part of a vulnerability chain for an attacker that once exploited is almost impossible to detect and remove.

Victor
link
fedilink
English
-29
edit-2
1M

Well, you feel how you feel, and you choose the products you want after this. Good luck to you! 👍

Edit: So many down votes for wishing someone good luck. The hive mind is odd sometimes.

Maybe they’ll reverse course with enough blowback, they did that once with ryzen already, don’t remember which Gen it was but it wasn’t going to be backwards compatible with certain type of mobos, but then they released it anyway and some mobo manufacturers did provide bios updates to support it.

Similarish situation could happen here, the biggest hangup I’d think is that the 3000 series is nearly 5 years old, and getting mobo manufacturers on board for that could be difficult.

@Grippler@feddit.dk
link
fedilink
English
151M

No they are just choosing not to roll out the fix to a known issue, which is screwing customers over on purpose (to increase profits). It’s not a matter of goodwill, they sold a product that then turned out to have a massive security flaw, and now they don’t want to fix even though they absolutely could.

Victor
link
fedilink
English
-111M

I’m guessing it’s a balance between old products, effort, severity, etc. As we’ve learned, this is only an issue for an already infected system. 🤷‍♂️

@Grippler@feddit.dk
link
fedilink
English
7
edit-2
1M

Ryzen 3000 series CPUs are still sold as new, I even bought one six months ago, they’re no where near being classified as “old”, they’re hardly 5 years old. And this is not only an issue for already infected systems because uninfected systems will intentionally be left vulnerable.

Victor
link
fedilink
English
-61M

Ryzen 3000 series CPUs are still sold as new

Ah, that changes things. Not great. But still,

uninfected systems will intentionally be left vulnerable

what I meant was that apparently only compromised systems are vulnerable to this defect.

@Auli@lemmy.ca
link
fedilink
English
11M

Just because a store is still selling their stock doesn’t mean AND is still making them and selling them.

@ShortN0te@lemmy.ml
link
fedilink
English
141M

No, but those vulnerabilities where there when you bought it.

Would a car have a defect that was shown 5 years later, then the manufacturer would have to recall it or offer a repair program and or money in exchange.

Since everything is proprietary you cannot even fix things like this by yourself. The manufacturer needs to be held liable.

Victor
link
fedilink
English
-51M

Would a car have a defect that was shown 5 years later, then the manufacturer would have to recall it or offer a repair program and or money in exchange.

I mean… A car is different, depending on the defect. It’s like “this window only breaks if you’ve already crashed the car”. (The defect only causes a vulnerability if the system is already compromised AFAICT.) And 5 years is much, much younger for a car compared to a CPU, but that’s not the important bit, I know.

But I agree with you all, I am not saying it shouldn’t be fixed, I was just saying I don’t think AMD is looking to screw over their customers on purpose. That’s all.

Norah - She/They
link
fedilink
English
4
edit-2
1M

“this window only breaks if you’ve already crashed the car”

No, it’s usually more like “this thing will break and cause a car crash” or “this thing will murder everyone in the vehicle if you crash”. And companies still will not fix it. Look at the Ford Pinto, executives very literally wrote off people’s deaths as a cost of doing business, when they’d turn into fireballs during even low speed rear-end collisions. Potentially burning down the car that hit them too.

Edit: I mean, just look at the Takata airbag recall. 100 million airbags from 20 different carmakers recalled because they wouldn’t activate during a crash.

Victor
link
fedilink
English
0
edit-2
1M

When I said “It’s like”, I meant it as a simile to what’s going on with AMD right now. Not with what’s actually going on with car companies. Car companies are a whole different topic and discussion, of which I know nothing.

@Harvey656@lemmy.world
link
fedilink
English
211M

So I have a 3700x, I’ve read about the vulnerability but don’t fully understand it. How at risk am I?

@ozymandias117@lemmy.world
link
fedilink
English
27
edit-2
1M

If an attacker gets access to your system, they will be able to ensure you can’t get rid of their access

It will persist across operating system installs

However, this requires them to get access first

@Harvey656@lemmy.world
link
fedilink
English
51M

Sounds like it’s time for an upgrade. Never know what kind of weirdos are out there. Thanks for the information.

@ulterno@lemmy.kde.social
link
fedilink
English
1
edit-2
1M

In short, if you’re pwned once, you are pwn3d f0r3v#rrrrreeeheehaahaahaa*cough**cough*


These are the kinds of exploits you use to create APT (Advanced Persistent Threats).

@psmgx@lemmy.world
link
fedilink
English
251M

If they get root or admin they can hack the chip itself.

But minor exploits, nada, no issue, you good. Gotta get root to make it happen.

Problem is if you, as they say, get got, you have no way of knowing if they’re in your CPU, and no way to fix if they did – basically gotta trash it and replace.

Yes.

Not particularly. The exploit requires ring 0 access, if an attacker managed to get that, you are screwed already.

@Decronym@lemmy.decronym.xyz
bot account
link
fedilink
English
7
edit-2
23d

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
IP Internet Protocol
NAS Network-Attached Storage
SSD Solid State Drive mass storage

3 acronyms in this thread; the most compressed thread commented on today has 4 acronyms.

[Thread #919 for this sub, first seen 12th Aug 2024, 20:35] [FAQ] [Full list] [Contact] [Source code]

@faethon@lemmy.world
link
fedilink
English
3
edit-2
1M

AMD published a list with the mitigation on Sinkclose on all their processor ranges, and the ComboPI version that will have a patch:

Security bulletin 7014

deleted by creator

deleted by creator

They aren’t patching CPUs that were released 5 years ago.

They should be patching back to Ryzen 1 since those are still perfectly good CPUs. 5-7 years really isn’t that old considering how little improvement there is with each generation.

@RedWeasel@lemmy.world
link
fedilink
English
21M

Sure, not much per gen, but if you compare say a 1700x vs the current 9700x, you are roughly looking at a 3x improvement in single and multicore performance increase.

Most of desktop users don’t care at all about these gains. Slap in normal ram and an SSD and a 1000 series Ryzen is ready to be a run of the mill desktop, that browses and can show media no problem.

I care! But I’m a power user. Most aren’t.

@RedWeasel@lemmy.world
link
fedilink
English
51M

I suppose that is true. Intel seems to think so as well as their low power n100 is about the performance of a 1500x.

Irremarkable
link
fedilink
31M

Some people really don’t think before they speak do they

@cron@feddit.org
link
fedilink
English
131M

Ryzen 2000 and 3000 are still fairly recent and were announced 5-6 years ago.

ms.lane
link
fedilink
English
31M

deleted by creator

TheHolm
creator
link
fedilink
English
71M

3600 was released in 2019. And it they was making it for at least 2 years.

@ShortN0te@lemmy.ml
link
fedilink
English
111M

The Ryzen 5 3600 is from 2019. The XT refreshes so Ryzen 5 3600xt from mid 2020

@9point6@lemmy.world
link
fedilink
English
401M

What are you on about?

Ryzen 3xxx series processors are still being sold new today

The oldest zen processors are only just over half a decade old—a consumer CPU should be expected to be in service at least double that time.

Support should be 5 years after End of Life or end of Manufacturing date.

AMD is producing them new or your local shop us? Because AMD doesnt care about your local tech shop dead stock.

@floofloof@lemmy.ca
link
fedilink
English
31M

Maybe they should, and also care about the many people still using these processors that are not very old.

astrsk
link
fedilink
211M

My threadripper 1950x is from 2017… and is the cpu powering my primary hypervisor perfectly fine. That’s not 18 years ago, that’s not even 8 years ago.

Auli
link
fedilink
11M

@just_another_person @TheHolm where do you get the 15 year old hardware from?

Really not good enough from AMD. I wonder if Intel wasn’t a complete dumpster fire right now if they would still cut off the fix at Zen 3 (I doubt it). There’s really no reason not to issue a fix for these other than they don’t want to pay the engineers for the time to do it, and they think it won’t cost them any reputational damage.

I hate that every product and company sucks so hard these days.

@kibiz0r@midwest.social
link
fedilink
English
51M

They did issue a fix: “Buy a new CPU please!”

That’s why they don’t mind the reputation hit. If 1 person swears allegiance to Intel as a result but 2 people buy new AMD chips, they’re still ahead. And people will forget eventually. But AMD won’t forget the Q3 2024 sales figures.

@ulterno@lemmy.kde.social
link
fedilink
English
2
edit-2
1M

Well, guess who’s not buying next gen Ryzen?

They are doing similar stuff with deliberately delaying Linux driver capabilities for Radeon 7xxx series, to make more GPUs die out faster, by overheating (zero RPM fan until 60°+).

deleted by creator

bruhduh
link
fedilink
English
101M

Basically, reflash spi chips and it’ll be gone, and to be infected by that, person gotta have physical access to hardware he hacks, and physical access is root access as always has been

TheHolm
creator
link
fedilink
English
123d

Nope. You do not need physical access for it, just root access. and you HW is compromised with only means to recover it is SPI flashing of CPU.

Attackers need to access the system kernel to exploit the Sinkclose vulnerability, so the system would have to already be compromised. The hack itself is a sophisticated vector that is usually only used by state-sponsored hackers, so most casual users should take that into account.

So it’s a vulnerability that requires you to.already have been compromised. Hardly seems like news.

I can understand AMD only patching server chips that by definition will be under greater threat. On the other hand it’s probably not worth the bad publicity not to fix more.

I personally agree. I think it’s being somewhat overhyped. If step one is physical access to get things rolling… like for sure some machines are in more public areas than others. But for me, someone would have to break into my house first, then access my machine, just to run exploits later. The exploit is pretty massive, but I think needs to be tempered with “first they need physical access”. Because physically controlling machines has always been number 1 for security.

It’s important because it allows them to directly modify the CPU’s microcode. Basically, the CPU has its own set of instructions, called microcode, which controls how the chip functions on a physical level. If they manage to change your microcode, even a full system reformat won’t kill the virus; You’ll need to either re-flash the CPU (which is not something the standard user or even power user will know how to do) or replace the entire CPU.

The reason that this is news is because it allows malware to embed itself into the processor microcode once kernel is breached. IE: If it is exploited for compromise, you either have to have the knowledge and hardware to reset the processor microcode manually (Requires an SPI flash tool) or you toss the hardware entirely. There’s no just ‘blow the drive away and reinstall the OS’ solution available.

@booly@sh.itjust.works
link
fedilink
English
131M

And that introduces a specific type of supply chain threat: someone who possesses a computer can infect their own computer, sell it or transfer it to the target, and then use the embedded microcode against the target, even if the target completely reformats and reinstalls a new OS from scratch.

That’s not going to affect most people, but for certain types of high value targets they now need to make sure that the hardware they buy hasn’t already been infected in the supply chain.

@Auli@lemmy.ca
link
fedilink
English
11M

I don’t think it gets to the microcode but the UEFI.

This sounds weird. I was in the impression that operating systems load updated cpu microcode at every boot, because it does not survive a power cycle, and because the one embedded in the BIOS/UEFI firmware is very often outdated. But then how exactly can a virus persist itself for practically forever?

Norah - She/They
link
fedilink
English
41M

The OS can’t get to the point of loading cpu microcode without that outdated, embedded microcode. The reason it can persist is because there aren’t a lot of good ways to see what that UEFI microcode actually is once it’s installed. Plus, only the UEFI tells you that it has successfully updated itself. There is no other more authoritative system to verify that against. So the virus could just lie and say it’s gone and you would never know. Hence needing to treat it as the worst case scenario, that it never leaves.

That being said it builds up vulnerabilities in anti-cheats to another beautiful crowstrike like domino cluster fuck

How severe is this vulnerability?

The good news is that in order to exploit the new vulnerability, the attacker first has to obtain kernel level access to the system somehow - by exploiting some other vulnerabilities perhaps.

The bad news is once Sinkclose attack is performed, it can be hard to detect and mitigate: it can even survive an OS reinstall.

@JASN_DE@lemmy.world
link
fedilink
English
101M

The other bad news: there are so many vulnerabilities on all systems which can be used to gain root-level access, it’s just a matter of time. Also, even future vulnerabilities will be an issue, as the underlying Sinkclose attacks will still work.

Possibly linux
link
fedilink
English
21M

Honestly not on a hardened setup

@JASN_DE@lemmy.world
link
fedilink
English
11M

Sure, if you’d rather like to believe that.

Possibly linux
link
fedilink
English
21M

If it was that easy to get root then we would be in serious trouble. The best way I can think of is social engineering.

@scoutFDT@lemm.ee
link
fedilink
English
541M

So basically what you are saying is we just need one pvp game with kernel level anti cheat to fuck up somewhere… yeah I’m sure that’s not going to happen.

Probably only on a targeted attack. I don’t see it being a mass target attack like a worm could be.
And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

Possibly linux
link
fedilink
English
11M

The USB and network stack

I don’t see it being a mass target attack like a worm could be.

Why not? Malware that survives a full new install is extremely valuable, and there are loads of games adding vulnerabilities with required kernel level rootkits. It’s only a matter of time until one of these vendors is exploited, and why wouldn’t you permanently own the significant chunk of the market with unpatched serious vulnerabilities while you’re at it?

Again: Mass spread vs target attack.
Remember WannaCry? Yeah, I don’t see that happen.
But (industrial) e-spionage on the other hand? Yup. Will happen 100%

For what reason?

Kernel level game anticheats are a great attack vector, and it’s one that inherently identifies and enables distribution to other vulnerable targets. It’s begging to self replicate.

Industrial espionage does not make sense, because most enterprises have, even if imperfect, restrictions on what can be installed on company computers that contain valuable information. You’re not going to get a game with kernel malware on a managed enterprise computer.

@Appoxo@lemmy.dbzer0.com
link
fedilink
English
2
edit-2
1M

Are you ignoring what I wrote earlier in the same thread?

Probably only on a targeted attack. I don’t see it being a mass target attack like a worm could be. And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

Anyway. Counter question: Why do you think gamers appear as a more valuable target with the anti cheat as a possible attack vector vs a business running literally the same CPU line-up but with fewer kernel level programs?

My personal opinion: You can’t extract as much money from private folks vs a business through blackmail and other solutions. Not in a wide casted attack.
Targeted individuals can be assumed to be at a higher risk (e.g. hacking their private devices like the gaming pc and then doing home office work in the same network, or misusing trust in the home network between pc and phone and then installing malware like pegasus).
But again: Not in a wide casted net. And you are probably better of using the good exploits for higher value targets.

And with crowd strike we have seen how reliable Antivirus is.

we just need one pvp game with kernel level anti cheat

Leaving aside that security patches should be done, if you install that kind of game on a system where you have any data worth protecting, you’re a dumb ass mtherfcker. Sorry, but seriously, that’s just how it is.

@scutiger@lemmy.world
link
fedilink
English
71M

Ignorance is not stupidity.

Despite this being reported on tech news, most people won’t even be aware that it’s a thing because most people won’t actually read about it. And the majority of gamers probably don’t even know what a kernel is or why an anti-cheat with elevated privileges would be a bad thing.

Most people buy their computers with Windows preinstalled and probably couldn’t tell you if the CPU is Intel or AMD.

Okay, fair point, let me rephrase: if someone knows what kernel (admin) level execution means, and installs a game that requires this on a computer where they keep important data, they are a dumbass mtherfcker :) Generally speaking though: most people shouldn’t be allowed to use technology - humans are unbelievably stupid for the most part.

Kernel level and admin level is not the same thing. For example on windows, you can’t really write your own kernel driver, and on Linux even root can’t do everything if capabilities have been revoked.

For the purpose of protecting important data, the distinction really doesn’t matter. And the good old xkcd comic has a point - for many people, all relevant data is in the user’s accessible storage area anyways. Hence me running almost all internet applications and steam in a jail.

TheHolm
creator
link
fedilink
English
151M

You need to be a root to exploit it, but if it get exploited any way to get rid of it is to throw MB to trash.

Patch/reflash with a new bios?

@Vash63@lemmy.world
link
fedilink
English
61M

How do you trust that the flash was done properly if you did it from the compromised system? This would only work if you flashed it externally somehow without the system running.

@Jumuta@sh.itjust.works
link
fedilink
English
2
edit-2
1M

deleted by creator

¯\_(ツ)_/¯

@Vash63@lemmy.world
link
fedilink
English
11M

Exactly. That’s why it’s a trash motherboard as soon as root access is gained. It can never again be trusted.

Possibly linux
link
fedilink
English
41M

A flash programmer

@jbk@discuss.tchncs.de
link
fedilink
English
31M

anyone know how intel’s microcode update policy is in comparison to AMD’s?

Eskuero
link
fedilink
English
401M

lol for the past 15 years I have “rebuilt” my desktop every 5 years but I didn’t expect the would try to force me out of my 7 3700x right on the date

@Schmuppes@lemmy.world
link
fedilink
English
161M

Which is a shame because our 3700X is still pretty potent for the average user or gamer.

dinckel
link
fedilink
English
41M

At launch, I’ve upgraded my system to a 3900x, and even today, it fulfills my cpu needs. This thing is incredible

Yea i got the 3900xt when i built my pc during covid. Love it but i had to disable a bunch of shit to prevent bluescreens from hypervisor shit

Eskuero
link
fedilink
English
41M

Yeah, I have been eyeing upgrades to get avx512 anyway because lately I have been doing very heave very low preset av1 encodes but when they are a dick about it I just feel like postponing it.

@teawrecks@sopuli.xyz
link
fedilink
English
651M

I feel like this is the perfect place for Right to Repair legislation: the product is broken? And it’s outside your support window? Then give customers what they need to make the fix themselves. It’s not good enough to say “meh, guess you gotta buy one of our newer chips then 🤷”

Possibly linux
link
fedilink
English
131M

Especially since the Linux community are the types to go way overkill

@Vilian@lemmy.ca
link
fedilink
English
91M

Yep, every intel or AMD CPU vulnerability get patched in the kernel before the official firmware patches

@Chakravanti@lemmy.ml
link
fedilink
English
261M

removed by mod

bruhduh
link
fedilink
English
51M

wake up samurai

@Chakravanti@lemmy.ml
link
fedilink
English
-141M

removed by mod

Darth_Mew
link
fedilink
English
21M

you need a mental evaluation

@Chakravanti@lemmy.ml
link
fedilink
English
-9
edit-2
1M

removed by mod

Can you rub those 2 braincells together any faster might help some not enough probably

Darth_Mew
link
fedilink
English
01M

please seek help

@Chakravanti@lemmy.ml
link
fedilink
English
11M

removed by mod

BrightCandle
link
fedilink
English
251M

AMD has unfortunately a long history of abandoning products before its reasonable on its graphics division. Its not really acceptable, up until earlier this year my NAS/server was running a 3600 and its only for power saving purposes I changed that as its still a very workable CPU in that role.

@kalpol@lemmy.world
link
fedilink
English
121M

Er I’m still running a FX-8350 as a gaming machine (not AAA games obviously). I had another one as a host for a few VMs and it was more than enough till the motherboard went. One day I’ll upgrade I guess.

I moved from an FX8350 to a R5 5600G a few years ago, having run it for about 9 years. Initially I didn’t think I’d notice much difference, but frankly it’s an entirely different ballgame.

@kalpol@lemmy.world
link
fedilink
English
11M

Oh yeah I plan to update. But only when I really get annoyed.

@numanair@lemmy.ml
link
fedilink
English
31M

Single core performance is niiice

Create a post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

  • 1 user online
  • 279 users / day
  • 589 users / week
  • 1.34K users / month
  • 4.55K users / 6 months
  • 1 subscriber
  • 3.47K Posts
  • 69.3K Comments
  • Modlog