The U.S. House Energy and Commerce Committee sent letters to Apple, Amazon, AMD, Arm, Google, Intel and Microsoft asking why they agreed to keep details of the Meltdown and Spectre vulnerabilities secret.
Intel is dancing for joy and "welcomes the opportunity" to continue their dialogue with Congress.
Either they are lying - because it is obvious that nobody looks forward to something like that..or they have a really good reason for this monumental failure...like being instructed by government agencies to leave some back-doors open.
It is clear that they have expressed their wishes to that affect before.
30 June, 2017
Today, June 30th 2017, WikiLeaks publishes documents from the OutlawCountry project of the CIA that targets computers running the Linux operating system. OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that creates a hidden netfilter table on a Linux target; with knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules and are concealed from an user or even system administrator.
The installation and persistence method of the malware is not described in detail in the document; an operator will have to rely on the available CIA exploits and backdoors to inject the kernel module into a target operating system. OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with default kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT rules to the PREROUTING chain.
So maybe they forgot to inform Congress.
According to Wikileaks the agencies are not content with the "voluntary sharing" and created the ExpressLane project:
B But this 'voluntary sharing' obviously does not work or is considered insufficient by the CIA, because ExpressLane is a covert information collection tool that is used by the CIA to secretly exfiltrate data collections from such systems provided to liaison services.
ExpressLane is installed and run with the cover of upgrading the biometric software by OTS agents that visit the liaison sites. Liaison officers overseeing this procedure will remain unsuspicious, as the data exfiltration disguises behind a Windows installation splash screen..
Pure speculation - of course as it is if your Passwords have already been stolen - since there is no way of knowing.