Meltdown exploits critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data that is currently processed on the computer. Meltdown work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.