So, I was looking up everywhere and could not find any mitigation for 
Spectre attack by the vim interpreter! I don't know if my question is 
correct or how feasible it is, but do you recall if there is any mitigation 
for different variants of Spectre attacks Specter v1 (Spectre-PHT), v2 
(Spectre-BTB), v4 (Spectre-STL) and v5 (Spectre-RSB) at the interpreter 
level for vim?
Since Spectre is all about speculative execution and not the actual 
translation (interpretation) steps I thought it might be dangerous that 
there is not any mitigation for it by the interpreter, I might be way too 
wrong tho.
I just felt, since there's no mitigation, it might be a good idea to send a 
text and let you guys know about it. And please correct me if there are 
mitigations for spectre in vim interpreter. 
Looking forward to hearing from you guys

-- 
-- 
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php

--- 
You received this message because you are subscribed to the Google Groups 
"vim_dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/vim_dev/5d65d4c0-4b56-4a41-ba00-27fd3b25a9c7n%40googlegroups.com.

Raspunde prin e-mail lui