Shoot the breeze, anything goes.
User avatar
Steven W
VIP
Posts: 2874
Joined: 2013-08-10 22:40

2013-12-22 20:24 »

http://www.pcworld.com/article/2082200/ ... phone.html

"The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts," the paper's authors wrote. "We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away."

I can't help but remember the other post about malware communicating through such techniques:

viewtopic.php?f=4&t=222

Apparently to ensure messages are sent secretly you not only need a very good encryption algorithm, but also a sound-proof Faraday cage.

User avatar
!
30%
Posts: 3263
Joined: 2013-02-25 18:36

2013-12-23 03:51 »

This is some seriously weird stuff. :o

CharlotteTheHarlot

2014-01-19 05:58 »

Another growth industry upcoming ...

Contractors that radio proof a panic room by laying out wall to wall, floor to ceiling, grounded wire mesh painted over with the shielding paint we use inside guitar cavities.

Of course your cellphone won't work but them's the breaks.

Post Reply