so, is there already somebody that wrote the exploit for it? are there any special things to consider exploiting such architecture back in the day or do the same basic principles apply?
EDIT: removed due to low effort and mark-up issues. thank you all for your feedback.
Yeah, somebody came up with one here: https://news.ycombinator.com/item?id=46469897