{"id":5552,"date":"2019-01-14T13:14:34","date_gmt":"2019-01-14T10:14:34","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5552"},"modified":"2019-11-15T14:34:29","modified_gmt":"2019-11-15T11:34:29","slug":"35c3-spectre-meltdown-2019","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/35c3-spectre-meltdown-2019\/5552\/","title":{"rendered":"Spektroloji: 2019 CPU donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131"},"content":{"rendered":"<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/two-severe-vulnerabilities-found-in-intels-hardware\/4586\/\" target=\"_blank\" rel=\"noopener\">Meltdown ve Spectre<\/a> olarak adland\u0131r\u0131lan CPU donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131 ile ilgili ilk yay\u0131n\u0131n ard\u0131ndan neredeyse bir y\u0131l sonra, <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/35c3\/\" target=\"_blank\" rel=\"noopener nofollow\">35. Chaos Communications Congress<\/a>\u2018de Graz Teknoloji \u00dcniversitesi\u2019nden (Avusturya) bir grup ara\u015ft\u0131rmac\u0131 CPU donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131 olarak bilinen vakalar\u0131n mevcut durumu hakk\u0131nda bilgi verdi. Spoiler: Ge\u00e7en y\u0131l, bu tehditlerin bir \u00e7o\u011funa \u0131\u015f\u0131k tutan bir y\u0131l oldu.<\/p>\n<h2>Meltdown ve Spectre\u2019nin \u00f6zeti<\/h2>\n<p>\u0130lk olarak, Meltdown ve Spectre\u2019nin ne oldu\u011funu ve birbirlerinden ayr\u0131ld\u0131klar\u0131 noktalar\u0131 hat\u0131rlayal\u0131m.<\/p>\n<p>Meltdown g\u00fcvenlik a\u00e7\u0131\u011f\u0131, modern CPU\u2019lar\u0131n emirleri s\u0131ra g\u00f6zetmeden uygulayabilmesi nedeniyle ortaya \u00e7\u0131kt\u0131. Bu, i\u015flem h\u0131z\u0131n\u0131 art\u0131ran \u00e7ok kullan\u0131\u015fl\u0131 bir \u00f6zellik olmas\u0131na ra\u011fmen baz\u0131 durumlarda CPU, \u00e7al\u0131\u015ft\u0131r\u0131lmamas\u0131 gereken hataya a\u00e7\u0131k bir kodu i\u015fleyebilir. Yani, \u00f6nce kod CPU taraf\u0131ndan y\u00fcr\u00fct\u00fcl\u00fcr ve sonra i\u015flemin tamamlanamayaca\u011f\u0131 anla\u015f\u0131l\u0131r. Bu gibi sorunlar\u0131n ortaya \u00e7\u0131kmas\u0131n\u0131n tek nedeni talimatlar\u0131n, s\u0131ra g\u00f6zetmeden y\u00fcr\u00fct\u00fclmesidir.<\/p>\n<p>Elbette, bu t\u00fcr i\u015flemlerin sonu\u00e7lar\u0131 hi\u00e7bir yere aktar\u0131lmaz veya hi\u00e7bir yerde kullan\u0131lmaz ancak CPU \u00f6nbelle\u011finde mikro mimari d\u00fczeyinde izler b\u0131rak\u0131r. Bu izler, daha sonra \u00f6nbellekten ay\u0131klanabilir. Bunun sonucunda \u00f6nbellek, ba\u015fka t\u00fcrl\u00fc eri\u015filemeyen verileri, mesela bir parolay\u0131 elde etmek i\u00e7in kullan\u0131labilir. Olay, \u015fu \u015fekilde ger\u00e7ekle\u015fir: Bir program kay\u0131tl\u0131 verilere eri\u015fim talebinde bulunur, sistem, makul bir \u015fekilde program\u0131n eri\u015fim yetkisi olmad\u0131\u011f\u0131 i\u00e7in eri\u015fim izni vermez. Ancak i\u015flemlerin d\u00fczensiz bir \u015fekilde y\u00fcr\u00fct\u00fclmesi nedeniyle, parola yine de \u00f6nbelle\u011fe al\u0131n\u0131r ve oradan kolayl\u0131kla elde edilebilir. K\u0131sacas\u0131, Meltdown yetkisiz bir i\u015flem y\u00fcr\u00fctmeye \u00e7al\u0131\u015f\u0131l\u0131rken ortaya \u00e7\u0131kar.<\/p>\n<p>Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da Meltdown\u2019a benzer. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da CPU i\u015flemlerini h\u0131zland\u0131rmakla ilgili olmas\u0131na ra\u011fmen bu sorunun as\u0131l kayna\u011f\u0131 modern CPU\u2019lar\u0131n dallanma \u00f6ng\u00f6r\u00fcs\u00fc \u00f6zelli\u011fidir. Temelde CPU, belirli bir do\u011frulukla B eyleminin A eylemini takip etti\u011fini tahmin eder. Bu nedenle A eyleminin sonu\u00e7lar\u0131 netle\u015fmeden B eylemini y\u00fcr\u00fctebilir. Tahmin do\u011fruysa ve A eyleminin ard\u0131ndan B eylemi ger\u00e7ekle\u015firse her \u015fey yolundad\u0131r. E\u011fer A eyleminin sonu\u00e7lar\u0131 B eylemini de\u011fil, C eyleminin tamamlamas\u0131 gerekti\u011fini belirtirse, CPU B dal\u0131n\u0131 b\u0131rak\u0131r ve C eylemini tamamlamak i\u00e7in ba\u015fka bir dala ge\u00e7er.<\/p>\n<p>Dallanma \u00f6ng\u00f6r\u00fcs\u00fc \u00f6zelli\u011fi, e\u011fitilebilir oldu\u011fu i\u00e7in \u00e7o\u011funlukla eylem s\u0131ralama modellerini hat\u0131rlar. B\u00f6ylece CPU performans\u0131n\u0131 ger\u00e7ekten art\u0131r\u0131r. \u00d6rne\u011fin birka\u00e7 kez A eyleminin ard\u0131ndan B eylemi gelirse CPU, mant\u0131ksal olarak bir sonraki i\u015flemde A\u2019dan sonra B eylemini yapmas\u0131 gerekti\u011fini varsayar. Ancak yine de yanl\u0131\u015f \u00f6ng\u00f6r\u00fcler olabilir. Dallanma \u00f6ng\u00f6r\u00fc \u00f6zelli\u011fi, normalde A\u2019n\u0131n ard\u0131ndan B eyleminin geldi\u011fini \u00e7ok iyi hat\u0131rlasa bile bazen B\u2019nin yerine C eylemi gelebilir.<\/p>\n<p>Uzun bir s\u00fcre boyunca sisteme, belirli bir dal\u0131n do\u011fru oldu\u011funu ve i\u015flemin her zaman bu \u015fekilde y\u00fcr\u00fct\u00fcld\u00fc\u011f\u00fcn\u00fc g\u00f6sterip e\u011fittikten sonra bir parametreyi de\u011fi\u015ftirerek s\u00f6z konusu dal\u0131n yanl\u0131\u015f olmas\u0131na neden olursan\u0131z CPU, \u00f6nce ilk dal\u0131 y\u00fcr\u00fctecek ve asl\u0131nda di\u011fer dal\u0131n y\u00fcr\u00fct\u00fclmesi gerekti\u011fini anlay\u0131nca da ilkini iptal edecektir. Ancak Meltdown\u2019da oldu\u011fu gibi, eylemin sonucu, tekrar ay\u0131klanabilece\u011fi bir yerde, mesela \u00f6nbellekte, kalabilir.<\/p>\n<p>Her iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n da sonucu hemen hemen ayn\u0131d\u0131r: Spectre, verilere yetkisiz eri\u015fim i\u00e7in bir kap\u0131 a\u00e7ar. Bu eri\u015fim, yaln\u0131zca dallanma \u00f6ng\u00f6r\u00fcs\u00fcnde bir sorun \u00e7\u0131kmas\u0131 halinde ger\u00e7ekle\u015fir. Ancak olas\u0131l\u0131k teorisine g\u00f6re d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcm\u00fczde bu ihtimalin ger\u00e7ekle\u015fece\u011fini anlayabiliriz.<\/p>\n<h2>Bir y\u0131l sonra: \u00e7ok say\u0131da yeni Spectre ve Meltdown \u00e7e\u015fidi<\/h2>\n<p>\u0130lk Meltdown ve Spectre g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n ke\u015ffedilmesinden sonra, ara\u015ft\u0131rmac\u0131lar konuyu daha yak\u0131ndan incelemeye ba\u015flad\u0131lar ve k\u0131sa s\u00fcre sonra sadece k\u00fc\u00e7\u00fck farkl\u0131l\u0131klar g\u00f6steren benzer sorunlar oldu\u011funu ke\u015ffettiler. Ara\u015ft\u0131rmac\u0131lar\u0131n bulgular\u0131na g\u00f6re CPU Geli\u015ftiricileri, Meltdown ve Spectre benzeri g\u00fcvenlik a\u00e7\u0131klar\u0131na yol a\u00e7an ba\u015fka optimizasyon \u00f6zellikleri de uyguluyor. Graz \u00dcniversitesi ekibi, Meltdown\u2019a benzeyen 14 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ve Spectre\u2019a benzeyen 13 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 tespit ederek toplamda 27 donan\u0131m g\u00fcvenlik a\u00e7\u0131\u011f\u0131 buldu. 2018 y\u0131l\u0131n\u0131n ba\u015flar\u0131nda bu ailelere ait yaln\u0131zca iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunuyordu.<\/p>\n<div id=\"attachment_5554\" style=\"width: 1910px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5554\" class=\"wp-image-5554 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/01\/14124039\/35c3-spectre-meltdown-2019-species.jpg\" alt=\"\" width=\"1900\" height=\"1080\"><p id=\"caption-attachment-5554\" class=\"wp-caption-text\">Bu y\u0131l tespit edilen Meltdown ve Spectre \u00e7e\u015fitlerinin s\u0131n\u0131fland\u0131r\u0131lmas\u0131<\/p><\/div>\n<p>Daha \u00f6nce AMD, CPU\u2019lar\u0131n\u0131n Meltdown s\u0131n\u0131f\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131 kar\u015f\u0131s\u0131nda risk alt\u0131nda olmad\u0131\u011f\u0131n\u0131 iddia etmi\u015fti. Ancak ara\u015ft\u0131rmac\u0131lar, Meltdown\u2019un Meltdown-BR adl\u0131 bir \u00e7e\u015fidinin AMD CPU\u2019lar\u0131nda etkili bir \u015fekilde kullan\u0131labildi\u011fini ke\u015ffetti. Dolay\u0131s\u0131yla \u015fu anda, en b\u00fcy\u00fck \u00fc\u00e7 global CPU sat\u0131c\u0131s\u0131n\u0131n (AMD, ARM ve Intel) CPU\u2019lar\u0131 hem Meltdown hem de Spectre a\u00e7\u0131klar\u0131 kar\u015f\u0131s\u0131nda risk alt\u0131ndad\u0131r. Bu CPU\u2019lar, her iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ailesinin baz\u0131 \u00e7e\u015fitlerine kar\u015f\u0131 savunmas\u0131zd\u0131r.<\/p>\n<p>Neyse ki bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00e7e\u015fitlerinin b\u00fcy\u00fck bir k\u0131sm\u0131, \u00fc\u00e7 sat\u0131c\u0131n\u0131n da (ARM, AMD ve Intel) CPU\u2019lar\u0131nda \u00e7al\u0131\u015fmaz. En az\u0131ndan yap\u0131lan testlerde, bu g\u00fcvenlik a\u00e7\u0131klar\u0131 s\u00f6z konusu CPU\u2019larda \u00e7al\u0131\u015ft\u0131r\u0131lamad\u0131. Ancak bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n \u00e7o\u011fu, en az\u0131ndan bir CPU\u2019da kullan\u0131labiliyor.<\/p>\n<p>\u015eirketler, bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatmak i\u00e7in CPU mikro kodlar\u0131, i\u015fletim sistemleri ve belirli programlar i\u00e7in Ocak 2018\u2019den itibaren d\u00fczeltme ekleri yay\u0131nlamaya ba\u015flad\u0131lar. Maalesef Spectre ve Meltdown donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131 oldu\u011fu i\u00e7in donan\u0131m d\u00fczeyinde bulunurlar. Bu nedenle yaz\u0131l\u0131m d\u00fczeltme ekleriyle tamamen ortadan kald\u0131r\u0131lmalar\u0131 m\u00fcmk\u00fcn de\u011fildir.<\/p>\n<p>Mesela Linux \u0130\u015fletim Sistemi \u00e7ekirde\u011fine uygulanan d\u00fczeltme eklerinden biri, sistemi \u00e7ok yava\u015flatt\u0131\u011f\u0131 i\u00e7in bir s\u00fcre sonra kald\u0131r\u0131ld\u0131.<\/p>\n<p>Spectre g\u00fcvenlik a\u00e7\u0131\u011f\u0131nyla ilgili ba\u015fka sorunlar da var. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, farkl\u0131 mikro mimari bile\u015fenlerini hedef ald\u0131\u011f\u0131 i\u00e7in her bile\u015fene uygun ayr\u0131 bir d\u00fczeltme ekinin tasarlanmas\u0131 gerekiyor. Ayr\u0131ca bu d\u00fczeltme eklerinin her biri i\u00e7in belirli i\u015flevlerin devre d\u0131\u015f\u0131 b\u0131rak\u0131lmas\u0131 veya belirli ek eylemlerin ger\u00e7ekle\u015ftirilmesi gerekli. Bu durum, performans\u0131 daha da d\u00fc\u015f\u00fcr\u00fcyor.<\/p>\n<p>Hatta d\u00fczeltme ekleri, bir\u00e7ok durumda performans\u0131 o kadar \u00e7ok etkiliyor ki d\u00fczeltme eki uygulanan bir sistem, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan CPU bile\u015fenlerinin tamamen kapat\u0131ld\u0131\u011f\u0131 bir sisteme g\u00f6re daha yava\u015f \u00e7al\u0131\u015f\u0131yor.<\/p>\n<div id=\"attachment_5555\" style=\"width: 1357px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5555\" class=\"wp-image-5555 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/01\/14124215\/35c3-spectre-meltdown-2019-drill.png\" alt=\"\" width=\"1347\" height=\"822\"><p id=\"caption-attachment-5555\" class=\"wp-caption-text\">Radikal bir \u00e7\u00f6z\u00fcm: <a href=\"https:\/\/twitter.com\/kreon_nrw\/status\/949063178645901312\" target=\"_blank\" rel=\"noopener nofollow\">Belirtilen noktalar\u0131 delerek<\/a> CPU\u2019nun g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan k\u0131s\u0131mlar\u0131n\u0131 \u00e7\u0131kar\u0131n (Tabii ki \u015faka yap\u0131yoruz)<\/p><\/div>\n<h2>Spectre ve Meltdown\u2019un Gelece\u011fi<\/h2>\n<p>Intel, 2018 y\u0131l\u0131n\u0131n Ekim ay\u0131nda yeni CPU\u2019lar\u0131n\u0131n (2019\u2019da \u00e7\u0131kacak olan nesil) donan\u0131m d\u00fczeyinde Spectre ve Meltdown korumas\u0131na sahip olaca\u011f\u0131n\u0131 <a href=\"https:\/\/www.anandtech.com\/show\/13301\/spectre-and-meltdown-in-hardware-intel-clarifies-whiskey-lake-and-amber-lake\" target=\"_blank\" rel=\"noopener nofollow\">a\u00e7\u0131klad\u0131<\/a>. Ancak bu a\u00e7\u0131klama, yukar\u0131da da ele ald\u0131\u011f\u0131m\u0131z bir\u00e7ok g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00e7e\u015fidinin yaln\u0131zca iki \u201ctemel\u201d t\u00fcr\u00fcn\u00fc kaps\u0131yordu. Ayn\u0131 \u015fekilde AMD de 2019 y\u0131l\u0131nda piyasaya s\u00fcr\u00fclecek olan yeni nesil Zen 2 mimarili i\u015flemcilerinde Spectre\u2019\u0131n bir \u00e7e\u015fidine kar\u015f\u0131 d\u00fczeltme eki uygulamay\u0131 planl\u0131yor. ARM de donan\u0131m g\u00fcncellemeleri uygulayacaklar\u0131n\u0131 taahh\u00fct ediyor ve \u201cgelecekteki t\u00fcm i\u015flemcilerinin Spectre tarz\u0131 sald\u0131r\u0131lara kar\u015f\u0131 dayan\u0131kl\u0131 olaca\u011f\u0131n\u0131\u201d <a href=\"https:\/\/developer.arm.com\/support\/arm-security-updates\/speculative-processor-vulnerability\" target=\"_blank\" rel=\"noopener nofollow\">iddia ediyor<\/a>.<\/p>\n<p>Tabii ki, bu harika haberler, gelecekte yeni cihaz alacaklar i\u00e7in ge\u00e7erli. 2018 y\u0131l\u0131 ve \u00f6ncesinde Intel, AMD ya da ARM CPU kullanan bir bilgisayar, ak\u0131ll\u0131 telefon ya da ba\u015fka bir cihaz sat\u0131n alanlar\u0131n, neredeyse t\u00fcm bile\u015fenler i\u00e7in d\u00fczeltme eki y\u00fcklemeleri gerekecek ve bu nedenle performans b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalacak. Muhtemelen baz\u0131 insanlar buna vakit bile ay\u0131rmayacak.<\/p>\n<p>CPU \u00fcreticileri, donan\u0131m d\u00fczeyindeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 uzun zaman g\u00f6rmezden geldi ve CPU\u2019lar\u0131n\u0131 yaln\u0131zca performans a\u00e7\u0131s\u0131ndan optimize etti. Ancak t\u00fcm bu optimizasyonlar\u0131n bir bedeli oldu: Baz\u0131 \u00f6zellikler ger\u00e7ekten iyile\u015ftirilirken di\u011ferlerindeki sorunlar artt\u0131. \u015eimdi, uzun bir s\u00fcre g\u00f6rmezden gelinmi\u015f olan bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan kurtulmak \u00e7ok zor olacak. Yine de bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanman\u0131n o kadar da kolay olmad\u0131\u011f\u0131n\u0131 ve bunun umut verici oldu\u011fu ifade etmeliyiz. En az\u0131ndan yeni nesil CPU\u2019lar \u00e7\u0131kana kadar\u2026<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/r5wtQBpRFsM?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meltdown ve Spectre olarak adland\u0131r\u0131lan CPU donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131 ile ilgili ilk yay\u0131n\u0131n ard\u0131ndan neredeyse bir y\u0131l sonra, 35. Chaos Communications Congress&#8217;de Graz Teknoloji \u00dcniversitesi&#8217;nden (Avusturya) bir grup ara\u015ft\u0131rmac\u0131 CPU donan\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131 olarak bilinen vakalar\u0131n mevcut durumu hakk\u0131nda bilgi verdi.<\/p>\n","protected":false},"author":675,"featured_media":5553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351,995],"tags":[1815,1507,1508,1816,1511,1504,877,1505],"class_list":{"0":"post-5552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-technology","9":"tag-35c3","10":"tag-ccc","11":"tag-chaos-communication-congress","12":"tag-cpu","13":"tag-kaos-iletisim-kongresi","14":"tag-meltdown","15":"tag-sistem-aciklari","16":"tag-spectre"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/35c3-spectre-meltdown-2019\/5552\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/35c3-spectre-meltdown-2019\/14998\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/35c3-spectre-meltdown-2019\/12580\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/35c3-spectre-meltdown-2019\/16929\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/35c3-spectre-meltdown-2019\/15128\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/35c3-spectre-meltdown-2019\/13925\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/35c3-spectre-meltdown-2019\/17620\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/35c3-spectre-meltdown-2019\/16756\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/35c3-spectre-meltdown-2019\/22067\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/35c3-spectre-meltdown-2019\/25268\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/35c3-spectre-meltdown-2019\/11315\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/35c3-spectre-meltdown-2019\/11289\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/35c3-spectre-meltdown-2019\/10213\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/35c3-spectre-meltdown-2019\/18332\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/35c3-spectre-meltdown-2019\/22205\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/35c3-spectre-meltdown-2019\/23600\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/35c3-spectre-meltdown-2019\/17806\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/35c3-spectre-meltdown-2019\/21886\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/35c3-spectre-meltdown-2019\/21832\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/35c3\/","name":"35c3"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5552"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5552\/revisions"}],"predecessor-version":[{"id":6858,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5552\/revisions\/6858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5553"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}