When you depend on the clown, it will hit you some day. So if you are hit by such, now finally move away again from only depending on the clown, and (for example) re-value your on-prem-ity.
The CPU needs to make the overheard signals look just like random noise. A cheap XOR-stream (compare 2FA like Google Authenticator, or the remote in your car keys) should cover that.
Well, some of these attacks exploit the actual values present in the memory, not their stored representations. Therefore it would not matter how you encode them on the way, right?