As far as I've been able to learn, the only way to avoid security
vulnerabilities due to Spectre variant 1 (CVE-2017-5753, "bounds check bypass")
is to insert fences to control the relevant speculative reads. I'm interested
in doing this because I work on a numerical modelling library that is us
> MSVC has recently gained a /QSpectre option that tries to do this for you
> (https://blogs.msdn.microsoft.com/vcblog/2018/01/15/spectre-mitigations-in-msvc/).
> While this can't be completely fool-proof, I can well believe that it will do
> as good a job as bored humans, and is much cheaper.
I w