People have been working up to it since earlier than that:
There is mention in the above paper that some nonstandard system clock techniques defeat the exploit, which might be of some use to end-users.
People have been working up to it since earlier than that:
There is mention in the above paper that some nonstandard system clock techniques defeat the exploit, which might be of some use to end-users.