zlacker

[parent] [thread] 4 comments
1. colejo+(OP)[view] [source] 2016-04-09 04:09:57
I like to believe that converting those EM signals back into something useful is beyond the ability of current technology, but I'd be happy to be proven wrong
replies(3): >>rdl+d >>gregpi+o >>trjord+yc
2. rdl+d[view] [source] 2016-04-09 04:14:57
>>colejo+(OP)
This has been a known/practical attack for decades. OTOH, it does require physical proximity, although you could probably do it with a remotely controlled sensor at an intermediate location near the target.

What would be terrifying would be if someone could figure out how to do this attack via software compromise of some hardware sensor system already present throughout the environment; say, a way to repurpose a wifi chipset to pick up nth-order harmonics off a keyboard bus or something. Then, remote-root of some lesser machine could be used to spy on a hardened machine.

replies(1): >>gregpi+y
3. gregpi+o[view] [source] 2016-04-09 04:18:21
>>colejo+(OP)
https://en.wikipedia.org/wiki/Van_Eck_phreaking

Have you heard of this?

Video demonstration https://youtu.be/ZZ5HS8GWIec?t=1m45s

◧◩
4. gregpi+y[view] [source] [discussion] 2016-04-09 04:21:21
>>rdl+d
That was done a couple years ago

"IN THE AGE of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it doesn’t even need to ask."

http://www.wired.com/2014/08/gyroscope-listening-hack/

5. trjord+yc[view] [source] 2016-04-09 09:38:49
>>colejo+(OP)
The NSA publishes standards for how to protect against this kind of attack: https://en.wikipedia.org/wiki/Tempest_(codename)

We can speculate about whether the tech exists, but read their guide to securing your Red Hat box and decide for yourself how good they are at publishing defense against attacks they won't tell you about: https://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf

[go to top]