> After a long disclosure process we release #SMoTherSpectre, a transient execution attack that uses port contention as a side channel (instead of caches) to leak register/memory data. Details: http://nebelwelt.net/blog/20190306-SMoTherSpectre.html paper: https://arxiv.org/abs/1903.01843 PoC: https://github.com/HexHive/SMoTherSpectre
Via https://twitter.com/gannimo/status/1103350542036856832
Let me break that down for you: it's similar to Meltdown/Spectre but uses a technique that doesn't involve evaluating "untrusted code".