{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/30ae66f3-cf9b-4b0b-8f96-9f360b545ece/622a27912d92300012d5736f?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Security Researchers Demonstrate New Speculative Execution Exploits - DTH","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/619570402eacc3a36070252c/1e111bad-e968-444a-b26b-9a07855179c5.png?height=200","description":"<p>Security researchers show how Branch History Injection attacks can get around Spectre attack mitigations, Windows File Explorer gets tabs in the Dev Channel, and Tinder integrates background checks into its in-app safety center.</p><p><br></p><p>Get the show notes <a href=\"https://docs.google.com/spreadsheets/d/e/2PACX-1vT2uK52XEryOkhioIsOB6-Y-pw3m83Op5l8Dee2fruRj06sspEyujs6Gzw6zrVPFWjMlNJkbt6cYpJ_/pubhtml?gid=952845610&amp;single=true\" rel=\"noopener noreferrer\" target=\"_blank\">here</a>.</p>","author_name":"Sarah Lane, Robb Dunewood and Tom Merritt"}