Read more https://packetstormsecurity.com/files/177739/gofetch.pdf
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
This whitepaper shows that the security threat from DMPs is
significantly worse than previously thought and demonstrates the
first end-to-end attacks on security-critical software using the
Apple m-series DMP. Undergirding the author's attacks is a new
understanding of how DMPs behave which shows, among other things,
that the Apple DMP will activate on behalf of any victim program
and attempt to leak any cached data that resembles a pointer.