Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
Essentially, computers got too fast and were sacrificing security for more speed. By predicting values in the cache, it leaves a side-channel leakage, which can lead to information being stolen (such as private keys).
This does not really affect your personal computer though. Code has to be running on the current machine in order to exploit this.
So, this affects cloud providers, such as AWS.
At this point, no in the wild exploitation has been found.