this post was submitted on 17 Jul 2024
679 points (99.0% liked)

PC Gaming

8660 readers
449 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments, within reason.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 18 points 4 months ago (1 children)

That's why I wrote "processor" and not CPU.

[โ€“] [email protected] 1 points 4 months ago* (last edited 4 months ago)

A processor that isn't Turing complete isn't a security problem like the TPM you referenced. A TPM includes a CPU. If a processor is Turing complete it's called a CPU.

Is it Turing complete? I don't know. I haven't seen block diagrams that show the computational units have their own cpu.

CPUs also have co processer to speed up floating point operations. That doesn't necessarily make it a security problem.