testing blockquote tag


here is the story

Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

In other words, it’s not just them. This may seem like deflection, but it’s also possible that the issue is more widespread than just Intel hardware — and Intel isn’t likely to blow smoke with a claim that can’t be verified. Other major chip and OS companies are almost certainly all already aware of the problem; indeed, Intel says some were about to make a joint announcement:

Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively.

Intel and other vendors had planned to disclose this issue next week when more software and firmware updates will be available.

You can expect most official details then; joint disclosures of major security issues by billion-dollar companies tend to come out on their own time. (Update: However, some companies are issuing emergency fixes and press releases today. This story is developing.)

Intel downplayed the performance hit: “Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time,” the statement read.

That’s good, but no doubt the impact will be measured carefully by benchmarks and explained in detail — some setups and applications will surely be affected more than others.



Intelはプロダクトならびにユーザーのセキュリティーの確保に最大限の努力を払っており、他の多くのテクノロジー企業と協力して問題の解決にあたっている。Intelはこの問題に関して、AMD、ARM Holdingsなどのメーカーや複数のOSベンダーと共に業界全体として迅速かつ建設的な解決策を得ていく。