Okay, I am at a real keyboard. Yes I understand Intel CPU's, my research as a graduate student depended on their architecture. Suffice the ring bus has 3 levels of execution. Rings one and two are relatively unimportant, but ring zero is privileged kernel space on the processor and ring three is user space. Ring three is where the processor receives requests for the processor time and the kernel organizes and schedules the processor compute request in ring zero. Anything that penetrates and exposes ring zero data which is where the cache ram and the processes that load and move the data to the processors occurs, is a thing that one should never happen. The fact that there are multiple vectors of attack, bluntly no data from a cache should EVER be exposed. I am not going into the minutia of detail here, just suffice to say that Intel IMHO has these exposures on such a regular basis that leads me to say they need to redesign their processors. I really don't care if it is through SGX, power changes, or any other method, the result is the same, exposure of the data. Linus Torvalds here said that Intel's attempts to patch meltdown and spectre were crap, and all the subsequent exposures of cache IMHO are symptoms of the same problem, an aging architecture that badly needs a redesign to fix the numerous flaws leading to exposure of cache data. Patches in software might mitigate, but still does not fix everything. And very few people ever update their bios like they should nor do they ever update the driver kit that might mitigate. But the only true fix would be a ground up redesign.