As for the impact on performance, Covey continues to emphasize the high workload. He admitted that, under the certain load, system performance will be observed more significantly weakened, so, Intel is still with industry partners continue to optimize, to minimize the impact.
According to Section’s view, there is no evidence that the two vulnerabilities caused the leakage and theft of real-world user data. However, he still suggests that the best way to stay safe is to immediately apply the vendor-supplied update.
Previously, on earlier CPU models, Smitch, vice president of engineering at Intel’s data center, said it is also working on remediation but could take weeks to deploy.
A copy of the list of CPUs that Intel has been affected by the vulnerabilities goes back to the 45nm old Core i7 and the Xeon 3400/5500 series dating back to 2009.
Intel official QA page for this loophole, the giants denied that this is the Intel hardware design flaw, but emphasized that hackers use all the modern processors will be side channel analysis and processing technology, and the implementation of the local code to be run locally, unable to launch a remote attack.