ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Major Intel CPU vulnerability

    IT Discussion
    29
    260
    26.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • EddieJenningsE
      EddieJennings @scottalanmiller
      last edited by

      @scottalanmiller said in Major Intel CPU vulnerability:

      @eddiejennings said in Major Intel CPU vulnerability:

      @scottalanmiller said in Major Intel CPU vulnerability:

      @eddiejennings said in Major Intel CPU vulnerability:

      @scottalanmiller said in Major Intel CPU vulnerability:

      @eddiejennings said in Major Intel CPU vulnerability:

      @dashrender said in Major Intel CPU vulnerability:

      @eddiejennings said in Major Intel CPU vulnerability:

      In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

      I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

      The question then is whether or not the OS patching will be sufficient.

      Depends if it is Intel based or from a more security-minded vendor.

      All Dell and all Intel.

      Then an OS patch cannot fix it.

      While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

      That handles the one issue, not the other.

      The "other" being the chip design flaw itself?

      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @EddieJennings
        last edited by

        @eddiejennings said in Major Intel CPU vulnerability:

        @scottalanmiller said in Major Intel CPU vulnerability:

        @eddiejennings said in Major Intel CPU vulnerability:

        @scottalanmiller said in Major Intel CPU vulnerability:

        @eddiejennings said in Major Intel CPU vulnerability:

        @scottalanmiller said in Major Intel CPU vulnerability:

        @eddiejennings said in Major Intel CPU vulnerability:

        @dashrender said in Major Intel CPU vulnerability:

        @eddiejennings said in Major Intel CPU vulnerability:

        In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

        I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

        The question then is whether or not the OS patching will be sufficient.

        Depends if it is Intel based or from a more security-minded vendor.

        All Dell and all Intel.

        Then an OS patch cannot fix it.

        While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

        That handles the one issue, not the other.

        The "other" being the chip design flaw itself?

        Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

        EddieJenningsE 1 Reply Last reply Reply Quote 0
        • EddieJenningsE
          EddieJennings @scottalanmiller
          last edited by

          @scottalanmiller said in Major Intel CPU vulnerability:

          @eddiejennings said in Major Intel CPU vulnerability:

          @scottalanmiller said in Major Intel CPU vulnerability:

          @eddiejennings said in Major Intel CPU vulnerability:

          @scottalanmiller said in Major Intel CPU vulnerability:

          @eddiejennings said in Major Intel CPU vulnerability:

          @scottalanmiller said in Major Intel CPU vulnerability:

          @eddiejennings said in Major Intel CPU vulnerability:

          @dashrender said in Major Intel CPU vulnerability:

          @eddiejennings said in Major Intel CPU vulnerability:

          In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

          I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

          The question then is whether or not the OS patching will be sufficient.

          Depends if it is Intel based or from a more security-minded vendor.

          All Dell and all Intel.

          Then an OS patch cannot fix it.

          While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

          That handles the one issue, not the other.

          The "other" being the chip design flaw itself?

          Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

          So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

          scottalanmillerS ObsolesceO 2 Replies Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @EddieJennings
            last edited by

            @eddiejennings said in Major Intel CPU vulnerability:

            @scottalanmiller said in Major Intel CPU vulnerability:

            @eddiejennings said in Major Intel CPU vulnerability:

            @scottalanmiller said in Major Intel CPU vulnerability:

            @eddiejennings said in Major Intel CPU vulnerability:

            @scottalanmiller said in Major Intel CPU vulnerability:

            @eddiejennings said in Major Intel CPU vulnerability:

            @scottalanmiller said in Major Intel CPU vulnerability:

            @eddiejennings said in Major Intel CPU vulnerability:

            @dashrender said in Major Intel CPU vulnerability:

            @eddiejennings said in Major Intel CPU vulnerability:

            In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

            I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

            The question then is whether or not the OS patching will be sufficient.

            Depends if it is Intel based or from a more security-minded vendor.

            All Dell and all Intel.

            Then an OS patch cannot fix it.

            While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

            That handles the one issue, not the other.

            The "other" being the chip design flaw itself?

            Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

            So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

            Intel is providing microcode updates to the hardware.

            But no question, we should all be questioning the use of Intel hardware in the future. We've always excused their FakeRAID stuff as a one-off misunderstanding of business customers; but this has shown that the same disregard for their customers and lack of proper thinking is much more broad and not limited to that one division.

            EddieJenningsE black3dynamiteB 2 Replies Last reply Reply Quote 1
            • ObsolesceO
              Obsolesce @EddieJennings
              last edited by

              @eddiejennings said in Major Intel CPU vulnerability:

              @scottalanmiller said in Major Intel CPU vulnerability:

              @eddiejennings said in Major Intel CPU vulnerability:

              @scottalanmiller said in Major Intel CPU vulnerability:

              @eddiejennings said in Major Intel CPU vulnerability:

              @scottalanmiller said in Major Intel CPU vulnerability:

              @eddiejennings said in Major Intel CPU vulnerability:

              @scottalanmiller said in Major Intel CPU vulnerability:

              @eddiejennings said in Major Intel CPU vulnerability:

              @dashrender said in Major Intel CPU vulnerability:

              @eddiejennings said in Major Intel CPU vulnerability:

              In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

              I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

              The question then is whether or not the OS patching will be sufficient.

              Depends if it is Intel based or from a more security-minded vendor.

              All Dell and all Intel.

              Then an OS patch cannot fix it.

              While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

              That handles the one issue, not the other.

              The "other" being the chip design flaw itself?

              Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

              So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

              Hardware replacement fixes Meltdown, but not Spectre, as the latter is an issue on almost all systems.

              1 Reply Last reply Reply Quote 0
              • EddieJenningsE
                EddieJennings @scottalanmiller
                last edited by

                @scottalanmiller said in Major Intel CPU vulnerability:

                Intel is providing microcode updates to the hardware.

                And I imagine the way to get it is from your computer's manufacturer, which for your ancient workstations, there probably won't be an update released.

                Right now, I'm trying to see if SuperMicro has any kind of update I can apply to our production servers.

                1 Reply Last reply Reply Quote 0
                • black3dynamiteB
                  black3dynamite @scottalanmiller
                  last edited by

                  @scottalanmiller said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  @scottalanmiller said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  @scottalanmiller said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  @scottalanmiller said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  @scottalanmiller said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  @dashrender said in Major Intel CPU vulnerability:

                  @eddiejennings said in Major Intel CPU vulnerability:

                  In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

                  I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

                  The question then is whether or not the OS patching will be sufficient.

                  Depends if it is Intel based or from a more security-minded vendor.

                  All Dell and all Intel.

                  Then an OS patch cannot fix it.

                  While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

                  That handles the one issue, not the other.

                  The "other" being the chip design flaw itself?

                  Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

                  So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

                  Intel is providing microcode updates to the hardware.

                  But no question, we should all be questioning the use of Intel hardware in the future. We've always excused their FakeRAID stuff as a one-off misunderstanding of business customers; but this has shown that the same disregard for their customers and lack of proper thinking is much more broad and not limited to that one division.

                  But isn't majority of vendors who sells servers only sell Intel based servers?

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @black3dynamite
                    last edited by

                    @black3dynamite said in Major Intel CPU vulnerability:

                    @scottalanmiller said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    @scottalanmiller said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    @scottalanmiller said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    @scottalanmiller said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    @scottalanmiller said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    @dashrender said in Major Intel CPU vulnerability:

                    @eddiejennings said in Major Intel CPU vulnerability:

                    In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

                    I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

                    The question then is whether or not the OS patching will be sufficient.

                    Depends if it is Intel based or from a more security-minded vendor.

                    All Dell and all Intel.

                    Then an OS patch cannot fix it.

                    While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

                    That handles the one issue, not the other.

                    The "other" being the chip design flaw itself?

                    Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

                    So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

                    Intel is providing microcode updates to the hardware.

                    But no question, we should all be questioning the use of Intel hardware in the future. We've always excused their FakeRAID stuff as a one-off misunderstanding of business customers; but this has shown that the same disregard for their customers and lack of proper thinking is much more broad and not limited to that one division.

                    But isn't majority of vendors who sells servers only sell Intel based servers?

                    No, in fact one of the biggest sells no Intel at all (IBM) and one of the biggest sells it only as a secondary (Oracle.) In fact, AFAIK, the only large vendor without something other than Intel in their lineup, was Dell and Dell changed their tune like eight months ago when AMD brought out their awesome new line of EPYC processors.

                    There is always options to go without Intel. Intel was just so heavily focused on being tied to Windows licensing that people just kept using it without looking for anything else.

                    black3dynamiteB 1 Reply Last reply Reply Quote 0
                    • black3dynamiteB
                      black3dynamite @scottalanmiller
                      last edited by black3dynamite

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @black3dynamite said in Major Intel CPU vulnerability:

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      @dashrender said in Major Intel CPU vulnerability:

                      @eddiejennings said in Major Intel CPU vulnerability:

                      In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

                      I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

                      The question then is whether or not the OS patching will be sufficient.

                      Depends if it is Intel based or from a more security-minded vendor.

                      All Dell and all Intel.

                      Then an OS patch cannot fix it.

                      While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

                      That handles the one issue, not the other.

                      The "other" being the chip design flaw itself?

                      Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

                      So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

                      Intel is providing microcode updates to the hardware.

                      But no question, we should all be questioning the use of Intel hardware in the future. We've always excused their FakeRAID stuff as a one-off misunderstanding of business customers; but this has shown that the same disregard for their customers and lack of proper thinking is much more broad and not limited to that one division.

                      But isn't majority of vendors who sells servers only sell Intel based servers?

                      No, in fact one of the biggest sells no Intel at all (IBM) and one of the biggest sells it only as a secondary (Oracle.) In fact, AFAIK, the only large vendor without something other than Intel in their lineup, was Dell and Dell changed their tune like eight months ago when AMD brought out their awesome new line of EPYC processors.

                      There is always options to go without Intel. Intel was just so heavily focused on being tied to Windows licensing that people just kept using it without looking for anything else.

                      What about vendors like xByte? They're pretty much a go to vendor for used servers.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • brianlittlejohnB
                        brianlittlejohn
                        last edited by

                        I wish xByte sold SuperMicro as well.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @brianlittlejohn
                          last edited by

                          @brianlittlejohn said in Major Intel CPU vulnerability:

                          I wish xByte sold SuperMicro as well.

                          I've told them that, too.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @black3dynamite
                            last edited by

                            @black3dynamite said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @black3dynamite said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            @scottalanmiller said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            @dashrender said in Major Intel CPU vulnerability:

                            @eddiejennings said in Major Intel CPU vulnerability:

                            In addition to OS patches, I assume we ought to be looking for BIOS updates as well, which, with many of our ancient desktops, there will probably be none.

                            I don't expect any for my 3 year old laptops, let alone my 5-7 year old desktops.

                            The question then is whether or not the OS patching will be sufficient.

                            Depends if it is Intel based or from a more security-minded vendor.

                            All Dell and all Intel.

                            Then an OS patch cannot fix it.

                            While I understand the problem itself is with the chip, aren't the OS patches being released supposed to alter how memory is handled, which doesn't fix, but rather mitigates the problem (and potentially lowers performance)?

                            That handles the one issue, not the other.

                            The "other" being the chip design flaw itself?

                            Right, the flaw is a literal bug and affects Intel. The broader (but less dangerous) issue is that certain types of processor tasks, mixed together, without being addressed by the OS, create a risk in memory.

                            So the true 100% fix is really going to be hardware replacement, unless it can be address by some kind of lower-level flash update of the hardware.

                            Intel is providing microcode updates to the hardware.

                            But no question, we should all be questioning the use of Intel hardware in the future. We've always excused their FakeRAID stuff as a one-off misunderstanding of business customers; but this has shown that the same disregard for their customers and lack of proper thinking is much more broad and not limited to that one division.

                            But isn't majority of vendors who sells servers only sell Intel based servers?

                            No, in fact one of the biggest sells no Intel at all (IBM) and one of the biggest sells it only as a secondary (Oracle.) In fact, AFAIK, the only large vendor without something other than Intel in their lineup, was Dell and Dell changed their tune like eight months ago when AMD brought out their awesome new line of EPYC processors.

                            There is always options to go without Intel. Intel was just so heavily focused on being tied to Windows licensing that people just kept using it without looking for anything else.

                            What about vendors like xByte? They're pretty much a go to vendor for used servers.

                            xByte doesn't sell used servers, only refurb.

                            1 Reply Last reply Reply Quote 0
                            • ObsolesceO
                              Obsolesce
                              last edited by

                              A good all-in-one article:

                              https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/

                              1 Reply Last reply Reply Quote 0
                              • black3dynamiteB
                                black3dynamite
                                last edited by

                                I haven't really looked into it because of how old the server.

                                But I have very old PowerEdge 2950 server that I use for lab use only and for some reason I have to turn off pti to boot into Linux kernel 4.14.11 on Fedora 27 VM on Hyper-V 2012 R2. It either loop back to the boot screen or only show a cursor after selecting the kernel.

                                1 Reply Last reply Reply Quote 1
                                • mlnewsM
                                  mlnews
                                  last edited by

                                  FreeBSD and OpenBSD still working on a response.

                                  DragonflyBSD, however, has had the fix for days.

                                  1 Reply Last reply Reply Quote 0
                                  • mlnewsM
                                    mlnews
                                    last edited by

                                    https://arstechnica.com/gadgets/2018/01/intel-faces-class-action-lawsuits-regarding-meltdown-and-spectre/

                                    1 Reply Last reply Reply Quote 0
                                    • mlnewsM
                                      mlnews
                                      last edited by

                                      Ars Technica agrees that Intel's CEO knew before he sold.

                                      https://arstechnica.com/information-technology/2018/01/intel-ceos-sale-of-stock-just-before-security-bug-reveal-raises-questions/

                                      S 1 Reply Last reply Reply Quote 0
                                      • S
                                        StorageNinja Vendor @mlnews
                                        last edited by

                                        @mlnews said in Major Intel CPU vulnerability:

                                        Ars Technica agrees that Intel's CEO knew before he sold.

                                        https://arstechnica.com/information-technology/2018/01/intel-ceos-sale-of-stock-just-before-security-bug-reveal-raises-questions/

                                        As long as his Broker executed this plan without MNPI he's in the clear.
                                        10b5-1 doesn't actually require public disclosure but it does help avoid PR problems like this.

                                        As a result of his stock sale, Krzanich received more than $39 million. Intel stock, as of today, is trading at roughly the same price as Krzanich sold stock at, so he did not yield any significant gain from selling before the vulnerability was announced

                                        SEC officials could still see the maneuver as a trade based on insider information—especially if there was no other material reason for Krzanich to sell the stock.

                                        He's following a set pattern on his trades, and no stockholders short of day traders were hurt by this. The SEC really isn't going to bother with this unless there is some sort of smoking gun found in the way of text messages telling his broker "SELL IT ALL NOW BAD SHIT GOING DOWN".

                                        scottalanmillerS RojoLocoR 3 Replies Last reply Reply Quote -1
                                        • scottalanmillerS
                                          scottalanmiller @StorageNinja
                                          last edited by

                                          @storageninja said in Major Intel CPU vulnerability:

                                          @mlnews said in Major Intel CPU vulnerability:

                                          Ars Technica agrees that Intel's CEO knew before he sold.

                                          https://arstechnica.com/information-technology/2018/01/intel-ceos-sale-of-stock-just-before-security-bug-reveal-raises-questions/

                                          As long as his Broker executed this plan without MNPI he's in the clear.
                                          10b5-1 doesn't actually require public disclosure but it does help avoid PR problems like this.

                                          As a result of his stock sale, Krzanich received more than $39 million. Intel stock, as of today, is trading at roughly the same price as Krzanich sold stock at, so he did not yield any significant gain from selling before the vulnerability was announced

                                          SEC officials could still see the maneuver as a trade based on insider information—especially if there was no other material reason for Krzanich to sell the stock.

                                          He's following a set pattern on his trades, and no stockholders short of day traders were hurt by this. The SEC really isn't going to bother with this unless there is some sort of smoking gun found in the way of text messages telling his broker "SELL IT ALL NOW BAD SHIT GOING DOWN".

                                          He's NOT following a set pattern, that was the point of one of the articles. The pattern was established only after he knew. But he's known for so long, there has been time to set a pattern.

                                          The one article's point was that the idea that he was following a pattern was a myth that someone injected to try to cover up that this was a completely new pattern that exists entirely as a continuing form of insider trading.

                                          He entire pattern IS him telling his broker that shit was going down and to bail on the company.

                                          1 Reply Last reply Reply Quote 0
                                          • RojoLocoR
                                            RojoLoco @StorageNinja
                                            last edited by

                                            @storageninja said in Major Intel CPU vulnerability:

                                            @mlnews said in Major Intel CPU vulnerability:

                                            Ars Technica agrees that Intel's CEO knew before he sold.

                                            https://arstechnica.com/information-technology/2018/01/intel-ceos-sale-of-stock-just-before-security-bug-reveal-raises-questions/

                                            As long as his Broker executed this plan without MNPI he's in the clear.
                                            10b5-1 doesn't actually require public disclosure but it does help avoid PR problems like this.

                                            As a result of his stock sale, Krzanich received more than $39 million. Intel stock, as of today, is trading at roughly the same price as Krzanich sold stock at, so he did not yield any significant gain from selling before the vulnerability was announced

                                            SEC officials could still see the maneuver as a trade based on insider information—especially if there was no other material reason for Krzanich to sell the stock.

                                            He's following a set pattern on his trades, and no stockholders short of day traders were hurt by this. The SEC really isn't going to bother with this unless there is some sort of smoking gun found in the way of text messages telling his broker "SELL IT ALL NOW BAD SHIT GOING DOWN".

                                            When you can click a button and make a cool $39 million, you can easily avoid the scrutiny of the SEC or anyone else. Money = power, power = easy to avoid legal entanglements.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 7
                                            • 8
                                            • 9
                                            • 10
                                            • 11
                                            • 12
                                            • 13
                                            • 9 / 13
                                            • First post
                                              Last post