Exploits: Intel CPU Backdoors, More Undocumented Instructions