it is unlikely that it would still be worth buying AMD if you had to disable SMT,
The latest data I can find is for Milan and Ice Lake SP. In those two cases, the former gains only 18.3% from SMT and the latter gains only 8.1% (or 9.2% in single-socket config) on SPECint2017:
Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
www.anandtech.com
Those are merely averages, however. It'll help more on some workloads and less on others. Since they didn't provide the subscores for those configs, this is all we've got. However, I think disabling SMT isn't enough to destroy the value proposition of these server CPUs.
the second part of the second probably can't be done on Windows based instances and is unknown to most users if it is done on a linux based VM.
Given how dominant Linux is in the cloud, I think it's probably not a deal-breaker if Windows Server doesn't support it? But, it seems easy enough that maybe they do?
As for Linux, Google was the one to contribute the patch for limiting core-sharing to threads in the same process. So, I'd assume they enable it in their cloud-hosted instances. Who knows about the others, but I think it's something most admins of high-value services are likely to know about and enable.
www.phoronix.com
A company just out for profits doesn't stand to gain from implementing these mitigations.
You assume mitigations are possible. Given what a low-level chip function instruction-scheduling is, I'd be surprised if there even is a microcode-level fix.
I think the mitigations are the ones I listed above, because so many side-channel attacks we know about depend on SMT. So, avoiding core-sharing by one means or another not only protects you from the vulnerabilities we know about, but also future ones yet to be discovered. In this day and age, it's just the responsible thing to do.
It seems to me another thing you could do is simply rent cloud instances that occupy an entire machine, leaving no room for other tenants. I don't know too much about cloud computing, but I'd be surprised if that wasn't an option available to customers with high-value data.
Meanwhile those of us who shared credit card info with dozens of sites, have bank accounts linked to maybe a dozen more for autopay and have their gov using services like AWS to store their biometric data and who knows how much else:
https://nypost.com/2020/05/07/homeland-security-to-move-biometric-database-to-amazon-cloud/ have to shoulder extra risks produced by this irresponsible company.
I think you're being a little hyperbolic, here. To successfully exfiltrate data via this attack, you need to know what other tenants are on your host and what software they're running. These kinds of timing-based side-channel attacks all require models of the
specific software being targeted. On a big, public cloud platform, you have no idea or control over what tenants you share a host with. It's very much an exploit for hostile governments and not garden-variety cyber-thieves.
And, for this particular vulnerability, the CVE score is only 5.6 (Medium), with an impact of 4.0 and exploitability of just 1.1:
nvd.nist.gov
If you're really concerned about your personal data getting stolen, you should disable SMT on any machine from which you do any online banking or from which you perform other sensitive operations.
(As a side note, have you tried e-checks? I have for metals and stocks and it is creepy how it is easier to direct transfer money right out of your checking account than it is to use a credit card. But for big purchases it is instant and fee free. But it feels like malware could drain an account in an instant.)
Yes, it's a clear example of an archaic electronic finance network. Hopefully, it gets phased out before long. Unfortunately, it seems most of the likely substitutes are proprietary services rather than an open standard.
Edit: All true except the multiple schedulers per core. They said multiple schedulers per CPU for AMD and Apple and a single for Intel.
IMO, the only sensible interpretation I see is that they meant multiple schedulers per core.