Some of the technology companies in China that received notice from Intel also have no proof that they have been abused. An Intel spokesman responded that the company was unable to notify all parties as planned due to early disclosure of the news.
The problem now is that before the vulnerability was announced, Intel did not prepare for a certain amount of advance in the U.S. government.
An Intel spokesman said: “The Google Project Zero team and affected suppliers, including Intel, follow a code of conduct that is responsible for, and in concert with, best practices.” The first disclosures, standards, and practices that have been established are in collaboration with industry participants and announced in the media Before the solution was developed and deployed, however, vulnerability information was exposed earlier than industry organizations plan to publicly disclose, and Intel planned to come into contact with the U.S. government and other agencies at this point in time.”
Intel eventually had to rush to deal with the news. As planned, Intel will notify major customers and other interested parties to develop patches as soon as possible before the disclosure of the vulnerability. The Meltdown and Specter vulnerabilities are particularly dangerous as these vulnerabilities theoretically affect all computer users and the end result is launching a massive clean-up effort at all companies to ensure everyone is up and running.