Taking a hit for the team, I added the
registry settings indicated in the Microsoft advisory and disabled the mitigations.
Since I have
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True there was no difference for Spectre. I would need a BIOS update to test that.
For Meltdown it changed
Windows OS support for kernel VA shadow is enabled: to false.
I'm not uninstalling the update to find out if the installing of the update, followed by the subsequent disabling of the update through the registry setting is the same as not installing the update at all, but, my best guess is, it would be the same.
So, there is 3 choices:
• Don't install the update
• Install the update and disable it in the registry.
• Install the update and leave it enabled.
The
potential problem in not installing the update is, it might prevent further security updates from being offered to the user.
The potential problem in installing the update, and disabling it in the registry is that it doesn't completely disable all ill effects from installing the update.
The potential problem in installing the update and leaving it enabled is a performance hit.
Addressing the issue of "This community has a reputation to uphold" I feel I would be remiss if I withheld a material fact, namely, the ability to install the update, but disable it as an alternative to not installing it at all.
For this box, I have it installed and enabled. I have a Win7 starter to update. I'll install it and depending on the performance hit, decide whether to leave it enabled or not when I get around to running this months updates on it.