7
7
0
Posted 3 y ago
Responses: 3
PO1 William "Chip" Nagel
Lt Col John (Jack) Christensen SGT (Join to see) Don't Feel Bad Gents, I used to do part of the TEMPEST Certifications but I'd be Totally Lost Now.
(2)
(0)
PO1 William "Chip" Nagel
SGT (Join to see) - I Imagine it is all done with Computers and a Little Imagination.
(2)
(0)
Can't wait for Quantum computing. Not just ones and zeros, but everything in between.
(3)
(0)
PO1 William "Chip" Nagel
Optical Attacks
....Like other side channel attacks, these range from the relatively simple (eavesdropping on a monitor via reflections) through to complex (communicating with an infected device via LED blinks). In a more hi-tech optical attack, lasers can be used to both read key strokes and inject faults that are later read to deduce the cryptographic key being sought.
Side Channel Attacks in General
Many of these attacks can be used to leverage other attacks, thus gaining more information about the target. If you are working in a high security environment, you will already know many of the ways to mitigate against these types of attacks. This is way many secure facility employ TEMPEST surveys. Regardless if you are working in a secure facility or not, there is chance someone is after your data and you need to look into ways to protect yourself.
The only way to fully protect against side channel attacks is to use your digital devices in a room buried deep underground, accessed by a long tunnel with shielded doors, lined with a Faraday cage, and running off of your own portable power supply. Luckily, very few people are in a position where the data they are working with is quite this sensitive. We are far more likely to fall victim to the “soft” end of side-channel access — BLE beacon powered advertising and the like, so rest easy.
Sources: medium.com
Edited by Mario Vulcano
Optical Attacks
....Like other side channel attacks, these range from the relatively simple (eavesdropping on a monitor via reflections) through to complex (communicating with an infected device via LED blinks). In a more hi-tech optical attack, lasers can be used to both read key strokes and inject faults that are later read to deduce the cryptographic key being sought.
Side Channel Attacks in General
Many of these attacks can be used to leverage other attacks, thus gaining more information about the target. If you are working in a high security environment, you will already know many of the ways to mitigate against these types of attacks. This is way many secure facility employ TEMPEST surveys. Regardless if you are working in a secure facility or not, there is chance someone is after your data and you need to look into ways to protect yourself.
The only way to fully protect against side channel attacks is to use your digital devices in a room buried deep underground, accessed by a long tunnel with shielded doors, lined with a Faraday cage, and running off of your own portable power supply. Luckily, very few people are in a position where the data they are working with is quite this sensitive. We are far more likely to fall victim to the “soft” end of side-channel access — BLE beacon powered advertising and the like, so rest easy.
Sources: medium.com
Edited by Mario Vulcano
(3)
(0)
Read This Next