This applies at a lot of levels in networking and computing. Various types of https://en.wikipedia.org/wiki/Timing_attack have been used to break memory, process, and virtualization boundaries. And in some cases, even air-gapped separate systems can leak information—cache partitioning doesn’t help you if the attacker is timing your page-load time to see if your visit to a page is your first one today.
This applies at a lot of levels in networking and computing. Various types of https://en.wikipedia.org/wiki/Timing_attack have been used to break memory, process, and virtualization boundaries. And in some cases, even air-gapped separate systems can leak information—cache partitioning doesn’t help you if the attacker is timing your page-load time to see if your visit to a page is your first one today.