In order to gain access to any information in privileged memory using one of these exploits, a user-level application must be launched on the specific machine to be compromised. This means that presently, an OS/2 executable must be used as the attack vector. As of this writing, we are not aware of any such code which executes on the OS/2 platform.
Browser-based attacks (running JavaScript) appear to require greater precision in a high-resolution timer
マイナー OS/2 最高www (スコア:3, おもしろおかしい)
Policy statement concerning Spectre and Meltdown exploits [arcanoae.com]
Re:マイナー OS/2 最高www (スコア:1)
そういってOS/2に人が集まると元の木阿弥
#OS/2なんて孤高の存在でこそ意義がある