Meltdown & Spectre discoveries credited to 22-year-old German genius
The identification of the "Meltdown" and "Spectre" vulnerabilities in Intel- and ARM-based processors -- including chips used in Apple's Macs, iPhones, and iPads -- can be credited almost entirely to a Google security researcher in his early 20s, Jann Horn.

Originally from Germany, Horn now works in Zurich, Switzerland with Project Zero, Google's zero-day team, Bloomberg noted on Wednesday. He's said to have discovered the issues while working alone, beginning in April, when he was reading Intel processor manuals to make sure chips could handle code he'd written.
It's in reading about speculative execution that Horn realized that sensitive data was being kept in memory and could potentially be accessed by clever hacking. After talking to a fellow Google researcher, he arrived at the idea of tricking a processor into unusual speculative executions that could be used to fetch specific data.
Horn eventually told Intel, ARM, and AMD about the situation on June 1. By the time Meltdown and Spectre were announced to the public this January, Horn was given lead credit.
Accounts differ on the amount of contact between Horn and Intel. At a conference in Zurich on Jan. 11, Horn said that after his initial data sharing, there was no discussion until Intel called him in early December to confirm other researchers had found the same issues. A Google spokesman, Aaron Stein, insists however that there was much more chatter.
"Jann and Project Zero were in touch with Intel regularly after Jann reported the issue," Stein told Bloomberg.
Apple has already released several related security fixes, with more in the works. It's nevertheless facing multiple lawsuits, as are companies like ARM and Intel.

Originally from Germany, Horn now works in Zurich, Switzerland with Project Zero, Google's zero-day team, Bloomberg noted on Wednesday. He's said to have discovered the issues while working alone, beginning in April, when he was reading Intel processor manuals to make sure chips could handle code he'd written.
It's in reading about speculative execution that Horn realized that sensitive data was being kept in memory and could potentially be accessed by clever hacking. After talking to a fellow Google researcher, he arrived at the idea of tricking a processor into unusual speculative executions that could be used to fetch specific data.
Horn eventually told Intel, ARM, and AMD about the situation on June 1. By the time Meltdown and Spectre were announced to the public this January, Horn was given lead credit.
Accounts differ on the amount of contact between Horn and Intel. At a conference in Zurich on Jan. 11, Horn said that after his initial data sharing, there was no discussion until Intel called him in early December to confirm other researchers had found the same issues. A Google spokesman, Aaron Stein, insists however that there was much more chatter.
"Jann and Project Zero were in touch with Intel regularly after Jann reported the issue," Stein told Bloomberg.
Apple has already released several related security fixes, with more in the works. It's nevertheless facing multiple lawsuits, as are companies like ARM and Intel.
Comments
Now there is another issue at work here and that is the fact that Apple has designed its or ARM compatible chips. That makes them liable for flaws but as we have seen they have already addressed those flaws so I'm not sure how much more they can be responsible for. I would be a different story if Apple was still buying ARM's designs but right now all that Apple puts into the chip is an instruction set.
This isn't at all about splitting hairs or terminology. It's the reality of architecting and design components and systems. At some point the design has to be committed to technology or implementation that cannot be practically or economically changed. Instigating legal and liability actions in response to design considerations that were committed decades ago when the attributes of contemporary concern did not exist serves no purpose other than to punatively extort money from the designers/owners of the committed designs. You can't change the past.
I wish we should use language such as "vulnerable" rather than "defective." Virtually everything we consume is "defective" if "it's not perfect" is the standard.