!!! Overview
[{$pagename}] is a [Side-channel attack] is an L3 [cache] which you place 'probes' on [cache] lines in the code segment of shared binaries, which get 'triggered' any time any [Processes] on the system loads that line into [cache] (i.e. the code was executed) which in effect allows an [Observer] to see which code other [processes] are executing.

[{$pagename}] has so far been used successfully to break [cryptography] including
* [AES] in [OpenSSL]
* [RSA] in GnuPG
* [ECDSA] in [OpenSSL]
* and lots more.

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [flush-reload-attacks|https://github.com/defuse/flush-reload-attacks|target='_blank'] - based on information obtained 2017-06-28-