electronicbineries :
What difference does it make when all the CPU's in the market are plagued with security holes that allows hackers to steal passwords and encryption keys.
Spectre and Meltdown may sound bad, but they are much harder to actually exploit in the real world, especially on single-user systems. To successfully compromise data with those exploits, you first need to compromise the system to install the malware. For single-user systems, this may very well never happen, rendering Spectre and Meltdown non-issues.
Once the malware is installed, the exploits can only compromise data as it is being processed by the CPU. On a server where thousands of transactions may be processed per second, the chances of a successful compromise are already low, just not low enough to be considered safe. On a single-user system where encryption keys and other similarly sensitive data is being processed once every now and then on a generally irregular basis, the chances of the exploit having exactly the right timing to piece the data back together is very low.
Also, since those exploits require intensive cache content and timing monitoring, there is a pretty good chance people would notice their CPU being pegged at 100% load across all hardware threads for no apparent reason.
For side-channel attacks like these, there is a fairly wide gap between an exploit being demonstrated in a controlled environment and turning it into a practical exploit in the wild.