> Indeed: http://www.daemonology.net/hyperthreading-considered-harmful/

Yikes. That's very disturbing. I'm glad you posted that.

It's not hard to imagine a malicious process discovering things other
than cryptographic keys. Just off the top of my head, hash tables
don't usually use cryptographically secure hash functions, so if you
can infer the memory access patterns of a program using hash tables
you might be able to infer something about the data it's dealing with.

Reply via email to