As explained by the researchers, the GoFetch vulnerability can be exploited by crafting 'chosen inputs to cryptographic operations, in a way where pointer-like values only appear if we have correctly guessed some bits of the secret key.'
No easy mitigation currently exists for this vulnerability, as it resides in the hardware.
[
add
]
[
|
|
...
]