Hello, Cyberax, you wrote: Cs> Became known details Meltdown and Spectre. If it is short: all is bad. Already and article : https://habrahabr.ru/post/346078/Actually, the essence of attack that is very simple and beautiful enough: we Drop a processor cache. We read a variable interesting to us from address space of a kernel, it causes an exception, but it will be processed not at once. Speculatively we do reading of an array which is allocated in our, user address space, on the basis of variable value from point 2. Sequentially we read an array and accurately we measure access time. All elements, except one, will be slowly read, and here an element which corresponds to value to the address inaccessible to us. Thus, object of attack is the processor microarchitecture, and attack in a software not to repair. I.e. Reading sequentially byte behind byte from the table (as I understand in the size in 256) and measuring access time to each byte, catch value of this byte outside of the user of a space. And , and? Though certainly there are subtleties, for example, the exception can to come earlier, than the table will be read up to the end. Or each time should be dropped also , to that-that the table can be , well etc.