Re: In the Olden Days, Microcode
Yeah, the concrete exploitation pathway for regular people is compromised update channels, which historically have not had much effort put into their security because "everyone knows" the CPU does strong verification already.