37
submitted 1 year ago* (last edited 1 year ago) by PhantomPhanatic@lemmy.world to c/cybersecurity@sh.itjust.works
you are viewing a single comment's thread
view the rest of the comments
[-] sudo@lemmy.fmhy.ml 4 points 1 year ago
[-] PhantomPhanatic@lemmy.world 2 points 1 year ago

I think I recall reading about this one too. There are all kinds of ways processors and devices leak information. If you have the time and access you can correlate a lot of things to specific hardware and software operations.

I remember hearing something about a typewriter bug that is tuned to determine the key pressed by the particular acoustic signature of each key press. These kinds of outside-the-box solutions really interest me.

EMI and crosstalk is another area where information can leak and there are already snooping devices that work using that.

this post was submitted on 17 Jun 2023
37 points (93.0% liked)

Cybersecurity

5502 readers
96 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS