Post war turing on cpu instruction set design knew how to leverage convolutionsl computation graphs – documented in the tunny report – to leverage conditional branching for cryptanalysis.
Even i was taught, in first year cd computer science computer architecture courses how the microcode behind each type of conditional branch instruction leverage amore basic computing model : handling the instruction pipeline itself.
What folks need to know is that the fixes indicate the wider problem: microcode download (for good or evil, or good again tomorrow when gchq releases its (well known) targeted spying patch
So what surprised me? That the precisely editions didn’t first require another zero day exploit, compromising the formal kernel security boundary
Gchq going for the user mode exploit is just brazen