Rating changes for last rounds are temporarily rolled back. They will be returned soon. ×

Meltdown + spectre vs testing systems

Revision en1, by Golovanov399, 2018-01-09 11:44:33

Hello everyone,

Some of you may know about recently discovered vulnerabilities (well, technically, there in one vulnerability and two attacks using it). I am not a cybersecurity expert, I know what is going on about the "read-all-those-breaking-news-titles" level, but as I understood, some things can slow down by 30%. So I have a couple of questions:

  1. Do testing systems like codeforces, yandex.contest, topcoder, atcoder, csacademy etc apply the patch? I don't know if testing machines store something that is important and shouldn't be stolen.

  2. If yes, does this mean that we now should multiply all time limits by 0.7? Maybe this coefficient is not so small because 30% is reached on some other type of operations which are not used in cp? On the other hand, branch prediction is used almost always in cp, as I know.

Somebody who knows how this works, answer, please.

Tags security, meltdown, spectre, performance


  Rev. Lang. By When Δ Comment
en1 English Golovanov399 2018-01-09 11:44:33 1023 Initial revision (published)