I see it was not only Intel's CPU's that were exploitable and the patch Intel did caused other issues. This leads me to believe people need to stop blaming all this on Intel.
The Meltdown and Spectre chip flaws — which devices are at risk, and what can you do to safeguard them?
I kind of agree with this in a way at this point. Part of me is thinking, "You know, MS surely wasn't slow to jump on board developing Windows for the Intel architecture." Same with all the other architectures supported by Windows. Anyone doubt MS didn't know about this before Intel? Doesn't seem unlikely to me. That is unless Intel did work with the U.S. government to leave this back door (and MS too). Anyway, I feel that the best solution to this might actually involve changing the architecture of operating systems and changing some computer languages fundamentally.
Seems to me the issue is that application devs want to be able to sculpt the use of memory with the languages (supported by Windows, Linux o/c) giving them the ability to do so. This means access to the kernel to see "what is out there" memory-wise, etc. This would then also mean that rogue coders can use the same handles to do the same thing. So, if "sculpting" memory management for developers were restricted to set choices (through the language and through OS support for such) via prefetch based handles, then existing handles that make it possible for applications to reach this level of the kernel to sculpt would not even be necessary for application creators. Windows memory management could handle it all. Even this could be made fairly sophisticated, giving developers the flexibility for the optimization that they desire...just make sure that Windows is actually carrying out of the assignment...no need for an application to read "what is out there".
I may be misunderstanding the issue fundamentally, but this is where I am for now. MS doesn't expressly forbid access to the kernel for devs who want to optimize better than the Windows native management. I am interested in what is happening here, although working from a sophmore knowledge base, so to speak. Thanks for any angle on this topic.
From what I have read, an "exploit of Intel's architecture" wasn't an easy one to find. This provides some evidence for the notion that some work had been done previously to try to make sure this could not happen. At least this seems apparent. It also seems apparent to me, though, that Microsoft could be going further to assist with Intel's dilemma with this vulnerability, working 100% as transparently as possible to better this "take my resources" patch. So I do wonder why all the focus is on Intel. Both Microsoft and Intel should be at the front with the details...specifically what's wrong and specifically what is being done.
One last thing. With this industry there are always multiple ways to see a problem...like prisms. Each one, be it Intel's view or MS' view or Apple's view, etc. are all driven by capitalistic concerns...normal healthy concerns...until there is a breakdown. The manufacturers and parts makers obviously have a big problem here, too. Yet, I think for the first time, we see the tower of PC computing, Intel, facing a genuinely grave situation. The company really needs cooperation from MS, or Intel's problem doesn't go away.
Unfortunately, this puts MS in the position of being viewed as the problem all along. If they come up with something that really bails out Intel, public perception would likely become "this fix should have been in place in the first place" and/or "look at what MS put us all through for an OS vulnerability". That said, I think the finger should be being pointed at MS to explain why the fix for this vulnerability requires stripping PCs of their edge power-wise. Intel, too. Yet, let's not forget about the prisms of computer owners, computer users, and IT professionals and network managers. These performance hits are big and not a little thing to them. The longer this drags out, the worse for them. What we need is full transparency on this issue. We need at least the general details of what is being looked at as a better option to the current patch. Give us everything that is 100% safe to divulge. Is MS looking into the possibility that languages are to blame? Is MS looking into the idea that MS' kernel could be upgraded or improved? OK, we have the emergency patch we can use, but I feel certain these other groups are going to want an answer better than the one we have seen so far.
It's not clever to speculate about this, but I wonder if the U.S. government, Intel, and MS are giving their last gasp to try to stay on the same page about this vulnerability...to keep it in place (keep it secret?). 100% true, I don't know if there was any kind of agreement, and it's pure speculation. If so, I can certainly imagine that perhaps MS' patch preserves it somehow. Some of the responses seem to point to this to me...knowing about the vulnerability for so long with no progress toward a fix, the fix after all that time seriously reducing PC performance, and the focused propoganda for ignoring the problem from MS and Intel, especially. Hope it's something else like just pure laziness or plain failure to cooperate, but full 100% transparency is the only way for this to be turned into any kind of a moral victory.
Other than a government/Intel/MS back door alliance, the worst possible angle I can think of on this...what if MS knows a better fix but is delaying it (with or without Intel's knowledge), hoping to be able to write off Windows 7 and Windows 8.1 without having deliver a patch to those programs? Hope this isn't happening...