As for the impact on performance, Covey continues to emphasize the high workload. He admits, therefore, under certain loads, The system performance will be observed significantly weakened, so Intel will continue with the industry partners continue to optimize, to minimize the impact.
According to Section's view, there is no evidence that the two vulnerabilities caused the leakage and theft of real-world user data. However, he still suggests that the best way to stay safe is to immediately apply the vendor-supplied update.
Previously, on earlier CPU models, Smitch, vice president of engineering at Intel's data center, said it is also working on remediation but could take weeks to deploy.
A copy of the list of CPUs that Intel has been affected by the vulnerabilities goes back to the 45nm old Core i7 and the Xeon 3400/5500 series dating back to 2009.
Intel is targeting this vulnerabilityOfficial QA page,The giants deny that this is a flaw in Intel hardware design, Emphasizing that hackers have used the side channel analysis and processing techniques of all modern processors and the code execution needs to be run locally and unable to launch remote attacks.