Bobinas P4G
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • People

Untitled attachment

Download link

Notices where this attachment appears

  1. Christine Lemmer-Webber (cwebber@octodon.social)'s status on Thursday, 11-Jan-2018 18:09:42 UTC Christine Lemmer-Webber Christine Lemmer-Webber

    Most of the acoustic cryptanalysis attacks https://en.wikipedia.org/wiki/Acoustic_cryptanalysis I've seen involve having a microphone nearby someone's computer. Some of them are severe, and even can read encryption keys off the CPU: https://www.pcworld.com/article/2082200/listen-up-rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html

    But lots of programs can get access to the microphone relatively easily. It should be easy as a process using a computer's own microphone to do these attacks too, right?

    In conversation Thursday, 11-Jan-2018 18:09:42 UTC from octodon.social permalink
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Bobinas P4G is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Bobinas P4G content and data are available under the Creative Commons Attribution 3.0 license.