Belated response but I believe it's worth explaining what SGX does so that people have a better idea of what's at risk. First of all, SGX is only found on Intel processors so anything running on AMD/ARM cpus aren't threatened by this. Even with all those processors rules out, SGX only exists on newer Intel processors. Instead of putting the list here which risks getting outdated, I will show you how to find the list of processors yourself:
for (e of document.getElementsByClassName('ark-product-name')) {
console.log(e.textContent)
}
What this outputs is the list of all processors that have SGX on them. Then you can search through the list to see if your processor is there (edit: here's a
pastebin of the current list of cpus).
Second, as of July 2019 SGX instructions
still aren't used by the Linux kernel because it doesn't support SGX yet. The patches haven't been merged. And the link only described the 21st revision of the patch. We are now at the
28th revision of the patch which was submitted to the mailing list 3 days ago. In other words, no linux kernel version has sgx support.
As for Windows, I would worry more about that because Intel has
published SGX drivers for Windows some time ago. So anyone running the affected CPUs on Windows
is at risk, while Linux users aren't.
Apparently MacOS doesn't
support SGX either, but that is not an official statement and this is only people's speculation. My guess is macs older than 2017 for sure don't have SGX support in the OS but again, this is a speculation.
Third, assume at this point that we are running bitcoin full nodes and SPVs on Linux. Since it doesn't have support for SGX, how are any of them vulnerable to this attack that steals stuff from SGX memory, when they can't put anything in SGX memory in the first place? There's a much greater chance that someone's going to use this to break a Windows DRM than attempt to use it to steal (hypothetical) cryptocurrency-related keys that may be stored in SGX.