This seems beneficial in systems where security concerns trump performance concerns. The above poster has probably made many such trade-offs already and would likely make more. (Full disk encryption, virtualization, protection rings, spectre mitigations, MMIO, ECC, etc.)
With exponentially increasing processor performance it does make sense for workstations where physical access should be considered in the threat model.