Thankfully, better designs such as seL4's VMM do exist, although it might need a little more work [1] until usable for the purpose.
(disclaimer: working at Google on virtualization security)
I mean, the US government no doubt had influence on the Trusted Computing Group (too bad the EFF totally shunned it), and through the magic of product binning and chip fab costs, we all have trusted platform modules.
ASLR currently seems wimpy.
I'm certain you are in a position to accomplish a great deal, no matter where you are in the hierarchy. Maybe the future is x86 hardware emulation for user mode processes.
Intel should be considered to be totally unreliable and incompetent.
I mean, no one buys office store safes and expects their things to be secure in them. But a processor is a little more expensive than a cheap safe and holds more valuable things.
Edit: and besides, Fortezza is an SSL protocol option.
Perhaps if we add one more thing, x86 will finally be secure. You are right, Intel should be left to their own devices.
SGX is at least a middle ground - it integrates the memory access checks very deep into the memory access circuitry, sufficiently deep to block all other privilege levels on the CPU. Whilst there may well be implementation flaws in SGX itself so far most attacks have been mounted via side channels, not directly exploiting CPU bugs.
In this sense my original statement was correct. Intel is pushing secure CPUs forward more than any other vendor.
It is the wrong sense. Intel is playing catchup more than any other vendor and are selling a product that is nothing more than a bunch of cobbled together features, my opinion in the view of the statement that AMD is glued together.