The actual conclusion is fairly clear also
"Developers and users cannot rely on Microsoft's current compiler mitigation to protect against the conditional branch variant of Spectre."
"Speculation barriers are only an effective defense if they are applied to all vulnerable code patterns in a process"
Which they are not, since that would be a huge performance hit.
"Speculation barriers are only an effective defense if they are applied to all vulnerable code patterns in a process" Which they are not, since that would be a huge performance hit.