This question is a means of preventing automated form submissions by spambots.
What are the l a s t four characters of "c30a3c4df493ac6090d3d25a"? You must also add "xx!1.." to the answer but type "1" as a word not a number.
Smilies
:clap: :crazy: :thumbdown: :thumbup: :wtf: :yawn: :tired: :relaxed: :grin: :smile: :wink: :sad: :eek: :shock: :???: :cool: :lol: :mad: :razz: :oops: :cry: :evil: :twisted: :roll: :!: :?: :idea: :arrow: :neutral: :mrgreen: :geek: :ugeek: :eh: :lolno: :problem: :shh: :shifty: :sick: :silent: :think: :wave:
   

If you wish to attach one or more files enter the details below.

CharlotteTheHarlot, 2014-01-19 05:58 »

Another growth industry upcoming ...

Contractors that radio proof a panic room by laying out wall to wall, floor to ceiling, grounded wire mesh painted over with the shielding paint we use inside guitar cavities.

Of course your cellphone won't work but them's the breaks.

!, 2013-12-23 03:51 »

This is some seriously weird stuff. :o

RSA keys obtained through CPU sounds

Steven W, 2013-12-22 20:24 »

http://www.pcworld.com/article/2082200/ ... phone.html

"The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts," the paper's authors wrote. "We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away."

I can't help but remember the other post about malware communicating through such techniques:

viewtopic.php?f=4&t=222

Apparently to ensure messages are sent secretly you not only need a very good encryption algorithm, but also a sound-proof Faraday cage.

Top