Acoustic cryptanalysis
I wonder if this could be used as a vector on an HT for a system that encrypts it traffic ..
The article is a good read and it has pictures of the device in use.
The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts.
I wonder if this could be used as a vector on an HT for a system that encrypts it traffic ..
The article is a good read and it has pictures of the device in use.