• Effective immediately we will be deleting, without notice, any negative threads or posts that deal with the use of encryption and streaming of scanner audio.

    We've noticed a huge increase in rants and negative posts that revolve around agencies going to encryption due to the broadcasting of scanner audio on the internet. It's now worn out and continues to be the same recycled rants. These rants hijack the threads and derail the conversation. They no longer have a place anywhere on this forum other than in the designated threads in the Rants forum in the Tavern.

    If you violate these guidelines your post will be deleted without notice and an infraction will be issued. We are not against discussion of this issue. You just need to do it in the right place. For example:

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Not open for further replies.


RF Cartography Ninja
Database Admin
Oct 27, 2002
95° 53 17.67
Acoustic cryptanalysis

The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts.
I wonder if this could be used as a vector on an HT for a system that encrypts it traffic ..

The article is a good read and it has pictures of the device in use.
Not open for further replies.