Updated Untrusted code mitigations (markdown)
diff --git a/Untrusted-code-mitigations.md b/Untrusted-code-mitigations.md
index 74323ba..474b8fb 100644
--- a/Untrusted-code-mitigations.md
+++ b/Untrusted-code-mitigations.md
@@ -1,6 +1,6 @@
# Background
-On January 3rd, researchers from Google’s Project Zero disclosed [a new class of attacks](https://googleprojectzero.blogspot.com/2014/07/announcing-project-zero.html) which exploit speculative execution optimizations used by many CPUs. Because V8 uses an optimizing JIT compiler, TurboFan, to make JavaScript run quickly, in certain circumstances it is vulnerable to the side-channel attacks described in the disclosure.
+On January 3rd, researchers from Google’s Project Zero disclosed [a new class of attacks](https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html) which exploit speculative execution optimizations used by many CPUs. Because V8 uses an optimizing JIT compiler, TurboFan, to make JavaScript run quickly, in certain circumstances it is vulnerable to the side-channel attacks described in the disclosure.
# Nothing changes if you execute only trustworthy code