
I would love to go for a walk down memory lane, but the AI bubble and Micron/Crucial are making that far too expensive or no longer an option 😢
https://www.google.com/maps/place/1+Memory+Ln,+Wolverhampton+WV11+1SD/@52.599442,-2.0910048,17.96z/
Just a thought but your local e-waste recycling centre probably has a lot of older or recyclable RAM and DIMM modules available... 🤔🙂
Sự kết hợp giữa DIMM có dung lượng khác nhau trên EPYC có thể ảnh hưởng hiệu suất #DIMM #EPYC #HiệuSuất #LLM #MachineLearning #MáyHọc #TốiƯuHóa #Optimization #Performance #EPYC7763
Anyone who thinks the #SteamMachine aka. #GabeCube / #GabenCube will be a $499 thing or even a $749 thing needs to get updated on #pricing for #hardware.
Thanks to the "#AI" #Scamconomy, #PriceFixing and #OpenAI buying 40% of global #DRAM production output due to #Trump's "#Stargate" shitshow and the circular #Scam #economy associated, the 2x16GB #DDR5-SODIMMs (even if those were slow -4800 and not the recommended #Zen4 -6000 speeds) will cost about $250+ as of today.
#SSD|s too - which use the same chip dabs - also climb beyond $100 per TB or > $50 for a 512 GB #NVMe.
So already these components are $300+ as of today, and industry insiders claim this will get much worse so I'm not even shure a $999 pricetag will be possible by Q1/2026. Not to mention the 8GB VRAM of the built-on, dedicaded #GPU!
The only reason why noone expects Apple to raise prices is because they already shaft their buyers by overcharging them for their #SolderedDownRAM & #SolderedDownSSDs and they tend to buy not just huge quantites, paying abovemarket, but also fewer, higher capacity chips.
(Video via #GamersNexus)
#Enshittification #AIslop #Scams #Scalping #PriceHike #PriceHikes #SKhynix #Micron #Samsung #AMD #SODIMM #DIMM #RAMpricing #Prices #ConsumerElectronics #Greedflation #USpol

Tiens, la recherche de l'EPFZ "Phoenix" (CVE-2025-6202) montre que des DIMM DDR5 (produites entre le 2021-1 et 2024-12) de SK Hynix, un de plus grand fabricant mondial de DRAM restent vulnérables au Rowhammer malgré des contre-mesures avancées intégrées dans la puce.
"Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization"
👇
https://comsec.ethz.ch/research/dram/phoenix/
⬇️
https://comsec-files.ethz.ch/papers/phoenix_sp26.pdf
⬇️
https://github.com/comsec-group/phoenix
Les chercheurs ont trouvé deux nouveaux schémas d’attaque et une méthode de synchronisation qui contournent les protections intégrées au DRAM.
Les bit-flips obtenus sont exploitables : lecture/écriture arbitraire via PTE, vol de clés RSA/SSH, et escalation vers root (moyenne ≈ 5 min 😵 ). L’ECC embarquée ne suffit pas.
Les auteurs recommandent et démontrent qu’un refresh ×3 empêche Phoenix de provoquer des bit-flips sur leurs tests, au prix d’une surcharge de perf mesurée (+~8%).
Modules DRAM non patchables — risque long terme selon les scenarios de la menace sur nos différents datacenters ou ordis...
PoC
👇
https://github.com/comsec-group/phoenix/tree/main/poc
https://vulnerability.circl.lu/vuln/CVE-2025-6202
#CyberVeille #DDR5 #DIMM #Phoenix #Hynix #Rowhammer #CVE_2025_6202