Slashdot reader headlessbrick writes: Google security researchers have discovered a way to bypass AMD's security, enabling them to load unofficial microcode into its processors and modify the silicon's behaviour at will. To demonstrate this, they created a microcode patch that forces the chips to always return 4 when asked for a random number. Beyond simply allowing Google and others to customize AMD chips for both beneficial and potentially malicious purposes, this capability also undermines AMD's secure encrypted virtualization and root-of-trust security mechanisms.
[ Read more of this story ](
https://it.slashdot.org/story/25/02/09/2021244/how-to-make-any-amd-zen-cpu-always-generate-4-as-a-random-number?utm_source=atom1.0moreanon&utm_medium=feed ) at Slashdot.