this post was submitted on 13 Jun 2023
13 points (100.0% liked)

Technology

37717 readers
465 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
top 7 comments
sorted by: hot top controversial new old
[–] Orvanis@lemm.ee 9 points 1 year ago (1 children)

From a tech perspective, insanely clever to use modern phones rolling shutter mode to sample significantly more data points.

From a "is this going to cause problems for the average person" perspective - not even close. Requires 65 minutes of recorded, stable footage. The camera must be < 6 feet away if the lights are on, and the cryptography algorithm must be running during that magic hour of recording...

It does enable remote attacks, but only if all very specific requirements are met, and it requires you have access to a camera for a long period of time that is perfectly positioned.

[–] saint@group.lt 1 points 1 year ago

sounds like a job for a hacked cam ;)

[–] someguy@lemmyland.com 4 points 1 year ago

Reminds me of LEDs used to extract data out of airgapped networks: https://threatpost.com/blinking-router-leds-leak-data-from-air-gapped-networks/126199/ but different because that one requires software within the airgapped network to exfiltrate.

Didn't there used to be network equipment that was vulnerable to data exfil from data status lights, or did I dream that up? Most data LEDs now just consistently blink.

[–] pbjamm@beehaw.org 3 points 1 year ago

Perhaps not the most practical of attacks, but still an impressive feat.

[–] peanuts4life@beehaw.org 2 points 1 year ago (1 children)

Yikes! I wonder how isolated the led has to be to the CPU power supply to prevent this sort of attack!

[–] cmnybo@discuss.tchncs.de 4 points 1 year ago

Placing a capacitor in parallel with the LED should be sufficient to prevent it. That would form a low pass filter when combined with the current limiting resistor for the LED.

The attack is not really practical though. The smart card has to be read for 65 minutes while recording the power LED. The cards are normally only read for a fraction of a second.

[–] supernovae@readit.buzz 2 points 1 year ago

Note to self - don't add flashing LEDs to any security devices