After Spectre and Meltdown, and the wishful patching of Intel’s security holes, now there is “Foreshadow”
Intel has been notified by various researchers that yet another security gap has been found in their processors. The vulnerability affects its chip security technology called Software Guard Extensions (SGX). This technology has been used in Intel processors since 2015 (2nd generation i3,i5,i7,xeon 3400+, X99 and X299 and later/above. 1st gen i* and Core2Duo or earlier are safe. Continue reading
This is Linus Trovalds about Intel patches for meltdown:
….. BULLSHIT. Have you _looked_ at the patches you are talking about? You should have – several of them bear your name.
…. It’s not that it’s a nasty hack. It’s much worse than that.
…… As it is, the patches are COMPLETE AND UTTER GARBAGE. Continue reading
Grub is and has been problematic for Manjaro. Everytime an other system in the same machine upgrades kernels or grub itself, it generates a /boot/grub/grub.cfg that is incompatible with Manjaro. Then Manjaro will not boot unless you have saved a stub of it menuentry from its own grub.cfg and patch it in the other systems. Then you can start Manjaro do a # sudo grub-install /dev/sd* and then # sudo update-grub to fix things.
You can uninstall grub from all other systems, but then what happens if Manjaro fails?
So, artix is just another system for Manjaro. Artix will create a boot grub entry that throws Manjaro into the known and familiar kernel panic, where you pull the plug and restart.
Someone at that “other forum” said it was about the intel-microcode that is included into the Manjaro kernel (which I didn’t know). No wonder you only find it in AUR! Because it is already within the system and this is why Manjaro’s graphics seem so good for anyone having intel only hardware.