this post was submitted on 17 Jul 2024
688 points (99.0% liked)

PC Gaming

8799 readers
352 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments, within reason.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Blue_Morpho@lemmy.world 2 points 5 months ago (1 children)

It's not a full CPU. It's more limited than GPU.

[–] rtxn@lemmy.world 18 points 5 months ago (1 children)

That's why I wrote "processor" and not CPU.

[–] Blue_Morpho@lemmy.world 1 points 5 months ago* (last edited 5 months ago)

A processor that isn't Turing complete isn't a security problem like the TPM you referenced. A TPM includes a CPU. If a processor is Turing complete it's called a CPU.

Is it Turing complete? I don't know. I haven't seen block diagrams that show the computational units have their own cpu.

CPUs also have co processer to speed up floating point operations. That doesn't necessarily make it a security problem.