While he has a point, I don't know that these types of exploits are high on Microsoft and Sony's issue lists.
The DRM-happy platform holders have a vested interest in mitigating exploits that could lead to access to the privileged stores or system reserve that might be holding their validation signatures and encryption keys. The monetary incentive to getting access is significant for well-funded criminal interests. OtherOS was enough motivation to compromise the PS3, and this was helped in part by successful bus glitching--something not related to row hammer but another case where assuming all is well physically compromises assumptions made by system software.
The vulnerability itself is limited to specific hardware configurations and being able to purposefully exploit this requires specific knowledge of the system in question.
I suppose it depends on what is meant by specific when one component of this specificity is every DIMM manufactured for years on end. The consoles are very specific hardware configurations, and there are those that will learn them very well.
I also understand that rowhammer qualification testing is now becoming more common among OEMs and there's no reason console manufacturers couldn't specific this qualification to their DRAM supplier.
Until there's another exploit they didn't think to test for. ECC and system monitoring would have provided more defense in-depth, because the system would have been able to correct or at least detect the mass of errors related to physical manipulation of the system, which would allow it to clamp down on the iteration rate.
If there is one area where I expect significant interest in either on-die memory, stacking under the APU, or to a lesser extent interposer solutions, it is making it physically difficult to compromise the signal lines or probe memory without seriously risking the destruction of the test system.
This would also be a counter pressure to my earlier reference to RAM types that can persist without power, since systems have been compromised by cryo-cooling RAM and yanking system power. Non-volatile RAM makes it even easier.
Torvald's
second post is definitely interesting, he suggests that data corruption is a big problem although there's no data to support the claim, nor is there any context. Is he talking about an 8Gb machine working for a day or running for a year. Our data suggests different although it's quite possible that ECC DRAM is less error prone than non-ECC DRAM - excepting the parity detection built in.
It's possible it's some indeterminate amount of time across many devices that make up the full range of the platform his organization winds up needing to bug fix or research.
Given the range of DRAM products out there, I'm not sure how many borderline bins are given to server-targeting products. Some value brands seem to be dodgier in the consumer space.