>As of 2018, almost every computer system is affected by Spectre, including desktops, laptops, and mobile devices. Specifically, Spectre has been shown to work on Intel, AMD, and ARM processors.
>While more difficult to utilize properly than Meltdown, Spectre may be much more challenging to defend against due to its generality. The original white paper even speculates that significant changes in microprocessor architecture might be needed in order to fully dispose of the problem.
>Since Spectre represents a whole class of attacks, there most likely cannot be a singular patch for it. While work is already being done to address special cases of the vulnerability, even the original website devoted to Spectre and Meltdown states: "As [Spectre] is not easy to fix, it will haunt us for a long time."
Yes it is, Spectre 1 already got patched and Spectre 2 is completely irrelevant since it's almost impossible to execute and doesn't even work on AMD, it was just thrown there to rope other CPU manufacturers into Intel's Meltdown even though it was entirely their fault and problem.
Wyatt Foster
is my old ppc G4 mac mini safe?
Joshua Roberts
This kills the x86. Yes, ARM is also affected, but if people need to buy new CPUs, they might as well switch archs.
Gavin Robinson
nope
Carson Rivera
First gen Atoms are safe, stock em while you can.
Jeremiah Torres
You forgot to mention that to exploit spectre 1 on amd you need to have eBPF enabled which isn't normally done in production.
Matthew Moore
RISC-VS TIME TO SHINE
Sebastian Anderson
SPECTRE affects everyone and can let one process access another processes memory, but only at the same privilege level. Programs and kernels will have to modified to deal with it but it shouldn't have a major impact on performance.
MELTDOWN is Intel specific and lets programs access even the highest kernel privilege levels. Preventing it requires a major sacrifice in performance.
Christopher Diaz
Spectre is literally nothing, despite the spooky name