with us to explain all this is dmitri alperovitch. security firm crowdstrike. dmitri, help us understand the flaws. there's more than just one. >> there were three discovered by google last year and are insidious. they're design flaws in the processors that take advantage of the optimizations that the processors rolled out 20 years ago to help run your code faster on these computers and, of course, the processors are the brains of these computing devices, responsible for the computations that take place, inside your phone, laptops and servers. what the researchers found out is you can take advantage of the operations of the processors to get access to the data you're not supposed to have when you're running your code. so it mostly impacts computers where you have shared users. >> sreenivasan: you're in the risk assessment business. what's our exposure as average customers or businesses? >> the important thing to understand is this could have been much worse. google first discovered this and started notifying vendors that have been wor