It was a rule 10b5-1 sale which means it had been planned well in advance and the rule is there to prevent inside trading.
The timing is just very unfortunate.
I may not be trader (only the wife has taken the Series 7, 63, 9 & 10 so I could ask her for clarification later on I suppose), but there's nothing I can see in § 240.10b5-1 that specified a specific timing of stock sales. Apparently Intel (and others) were told about this last June - ample time to rig up a stock sale. (
https://www.gpo.gov/fdsys/pkg/CFR-2017-title17-vol4/xml/CFR-2017-title17-vol4-sec240-10b5-1.xml)
Okay, now that the actual security details are out, finally... it may very well turn out to affect AMD and every other processor maker in existence. The CERT advisory lists AMD as "affected". And given that it's a timing attack, and AMD chips do speculative execution (as does every modern processor) - it's way to early too make the claim it's Intel-only.
Let's get something straight here; there are
TWO separate issues here.
1)
Meltdown (CVE-2017-5754
aka Variant 3): This is the easy to exploit flag that affects almost ALL modern day Intel chips - and a few ARM ones. It does NOT - I Repeat
NOT affect AMD Chips.
2)
Spectre (CVE-2017-5753
aka Variant 1 & CVE-2017-5715
aka Variant 2): This bug is harder to exploit but DOES affect
all the major CPU manufacturers in varying degrees (e.g. only a subset of CPU's from these manufacturers are affected).
Meltdown is the one most folk are talking about because of the performance impact on host systems that the fix will implement. It allows applications to read protected kernel memory with apparent ease.
Spectre affects a subsection of CPU's from all the vendors - and, if exploited, allows an attacker to potentially steal data from the kernel hypervisor upwards (hypervisors as well). That said, the exploit is currently much much harder to craft - which is it's only saving grace as of now. However expect that to change in the coming weeks.
Of the two fixes,
Meltdown is an easy fix, with a huge performance impact as it cannot be fixed with a microcode patch.
Spectre is still a question mark as its fix is going to be harder to craft. Performance impact of
Spectre fixes is unknown as of writing, however it
may be patchable with a microcode update.
AMD have stated that they believe NONE of their CPU's are susceptible to Variant 2, however Variant 1's still up in the air and they're awaiting more information. Researchers have stated however than the
Ryzen chips are affected and Google confirmed that the FX and PRO derivatives are susceptible in certain configurations.
So we have the same “flaw” in two different chip architectures. ..... I stand firm that this was a three letter agency backdoor.
Nope, two different flaws. Time to remove that tin-foil hat again.
All Apple devices (even the new iMac Pro) are affected. Anything with an ARM processor ->
https://developer.arm.com/support/security-update
iPhone X A11 Bionic is a derivative version of the Cortex A32. This is as big as it gets - ARM hasn't released info as yet regarding this specific variant as I suspect it might have significant impact on Apple.
Please stop being so
bloody hysterical!

The A32 is NOT - I Repeat
NOT on the list of CPU's that ARM have identified as being affected by
Spectre: The FULL list of ARM CPU's susceptible to
Spectre is: Cortex-R7, Cortex-R8 [
these two CPU's are highly specialized CPU's and not in any standard gear], Cortex-A8, Cortex-A9, Cortex-A15, Cortex-A17, Cortex-A57, Cortex-A72, Cortex-A73, and Cortex-A75 [
as used in Qualcomm's new Snapdragon 845].
In addition, ARM identified the A15, A57 and A72's are
ALSO being susceptible to
Meltdown.
Until ARM have identified the A32 (or indeed any of the Apple derivatives) you're just guessing based on ignorance of the problems identified.
