Currently lots of information from inside a compromised workstation (or fancy application reading and reporting it somewhere for whatever statistic purpose) can be read:
https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection#this_is_from_KVM_.2B_whonix_12_.28cat_.2Fproc.2Fcpuinfo_inside_WS.29
Seems like CPU features can be reduced:
https://www.berrange.com/posts/2010/02/15/guest-cpu-model-configuration-in-libvirt-with-qemukvm/
Add new 'kvm' domain feature and ability to hide KVM signature:
https://www.redhat.com/archives/libvir-list/2014-August/msg00744.html
Maybe more can be masked such as model and clock frequency.
As I understand, these features have been added to ease CPU migration in heterogeneous CPU environments. We can reuse these features to hide more hardware identifiers.
Needs research if there would be a performance penalty or something else would speak against this.