The attack is effective against various cryptographic algorithms, even those designed to resist chosen-input attacks.

Running cryptographic processes on specific CPU cores lacking the DMP may also be necessary but could further impact performance.

Apple MacBook Air M2 resting on desk next to AirPods Pro and PS4 controller.

Marcus Mears III / How-To Geek