Herjan Security on Nostr: Summary: - Commodity PCs' built-in sensors, such as microphones, unintentionally ...
Summary:
- Commodity PCs' built-in sensors, such as microphones, unintentionally capture electromagnetic side-channel leakage from ongoing computation.
- This leakage can be conveyed through supposedly-benign channels like audio recordings and Voice-over-IP applications.
- Remote and passive analysis of these channels allows for physical side-channel attacks on computation without physical proximity or the ability to run code on the target.
- The captured computation-dependent leakage can be used to steal secret keys, detect web pages being loaded, and identify hidden opponents in online games.
Hashtags: #sidechannels #PCs #sensors #sidechannelattacks
https://www.schneier.com/blog/archives/2024/01/side-channels-are-common.html
- Commodity PCs' built-in sensors, such as microphones, unintentionally capture electromagnetic side-channel leakage from ongoing computation.
- This leakage can be conveyed through supposedly-benign channels like audio recordings and Voice-over-IP applications.
- Remote and passive analysis of these channels allows for physical side-channel attacks on computation without physical proximity or the ability to run code on the target.
- The captured computation-dependent leakage can be used to steal secret keys, detect web pages being loaded, and identify hidden opponents in online games.
Hashtags: #sidechannels #PCs #sensors #sidechannelattacks
https://www.schneier.com/blog/archives/2024/01/side-channels-are-common.html