this post was submitted on 17 Jun 2023
35 points (92.7% liked)
Cybersecurity
5672 readers
126 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Reminds me of a story from nearly a decade ago where researchers were able to decrypt an RSA key by recording a CPU with a phone.
The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts
I think I recall reading about this one too. There are all kinds of ways processors and devices leak information. If you have the time and access you can correlate a lot of things to specific hardware and software operations.
I remember hearing something about a typewriter bug that is tuned to determine the key pressed by the particular acoustic signature of each key press. These kinds of outside-the-box solutions really interest me.
EMI and crosstalk is another area where information can leak and there are already snooping devices that work using that.