at first it seems these are two entirely different exploits. digging a bit deeper … they both share one ultimate concept … subjugating the hardware (core/chip), rather than the os's software. if i understand correctly … the first one even bypasses the os...