In case you thought browser sandboxing would protect you, here's an excerpt from the Spectre paper:
> Attacks using JavaScript: In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.