As expected, Google goes the extra mile again to keep their users safe.
However, in the case of Spectre, I think the OS should try to prevent exploitation rather than end programs, with a user-facing toggle to disable mitigations per-program for compatibility reasons.
[1] https://www.malwarebytes.com/blog/news/2021/08/macos-11s-hid...
Do not fall into the "I put production on one side and preproduction on the other"
Cloud providers allows great isolation, even if many people fail to implement this (for instance, by using VPC-peering / network hub / shared VPC / whatever).
Indeed, one could implement this "on-prem": vxlan and friends are there for you. It does require some skills, tho.
I believe the backbone of infrastructure security lies in two pieces: first, the ability to deploy stuff easily, quickly, autonomously. Then, the ability to deploy stuff with no cost overhead (no "price per project" or whatever).
Frankly I'm not surprised. Beyond the initial scramble to deal with the huge open barn door that the first variants represented, the temperature on side channel attacks cooled for a bit. Given that it's extremely difficult to test any mitigation, due to noise, etc, it's not hard to imagine how this slipped through.
The performance/security tradeoff we constantly face in this area seems to be constantly drawn on the side of performance. Most people seem to believe that they're mostly running trusted code on their computers, and that trusted code shouldn't need security mitigations. I challenge that, as native applications, particularly on multi-user systems, already have a security model that is being violated by cross-process attacks. We shouldn't have the situation where some random third-party app has access to data in other processes, even if both are running as the same user. People working on the Linux kernel no doubt have a spectrum of opinions, but it's clear that the very, very conservative approach they've taken to mitigation puts performance as the #1 priority, which is exactly the default that got us into this situation.
I love how far and and Intel have come, and how you can get a massive arm CPU, but these modern hardware security issues seem to be a more frequent issue(is this true?) And to stop them one takes a decent performance penalty..... Which is way less than ideal.