!!! Overview [{$pagename}] is a [Side-channel attack] is an L3 [cache] which you place 'probes' on [cache] lines in the code segment of shared binaries, which get 'triggered' any time any [Processes] on the system loads that line into [cache] (i.e. the code was executed) which in effect allows an [Observer] to see which code other [processes] are executing. [{$pagename}] has so far been used successfully to break [cryptography] including * [AES] in [OpenSSL] * [RSA] in GnuPG * [ECDSA] in [OpenSSL] * and lots more. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [flush-reload-attacks|https://github.com/defuse/flush-reload-attacks|target='_blank'] - based on information obtained 2017-06-28-