diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index e83d4169..0c944bff 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -43,7 +43,7 @@ tor="http://sejnfjrq6szgca7v.onion"
This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily.
+This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily. MacOS users check How to enable full mitigation for Microarchitectural Data Sampling (MDS) vulnerabilities on Apple Support
When running a enough recent kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*
. By using tail -n +1
instead of cat
the file names are also visible.