Jeffrey Goldberg · @jpgoldberg
1699 followers · 1041 posts · Server ioc.exchange

@jedisct1, spaces in passwords have had this problem with just humans listening. (I don’t know of actual experiments, but my guess is that it would take just a few occurrences for a human listening to someone type their to learn where the spaces are in it.)

But now this goes well beyond that. And, as the article says, this is a with lots of opportunities to exploit without specialized gear.

#password #sidechannel

Last updated 2 years ago

IT News · @itnewsbot
3298 followers · 263498 posts · Server schleuss.online

Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away - Enlarge / Left: a smart card reader processing the encryption key of an... - arstechnica.com/?p=1947319 &it

#biz #features #smartcards #encryption #sidechannel

Last updated 2 years ago

Tech news from Canada · @TechNews
636 followers · 19073 posts · Server mastodon.roitsystems.ca

Ars Technica: Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away arstechnica.com/?p=1947319 &IT

#Tech #arstechnica #it #technology #sidechannel #encryption #smartcards #features #biz

Last updated 2 years ago

Markus Wamser · @wamserma
24 followers · 98 posts · Server hachyderm.io
Renaud Lifchitz :verified: · @nono2357
252 followers · 1128 posts · Server infosec.exchange

RT @0xor0ne
Interesting side channel attack against python Django framework by @DBrinkrolf (@SonarSource)

sonarsource.com/blog/disclosin

#sidechannel #infosec #cybersecurity

Last updated 3 years ago

Patryk Krawaczyński · @agresor
42 followers · 142 posts · Server infosec.exchange
Tech News Worldwide · @TechNews
11292 followers · 97991 posts · Server aspiechattr.me
(RTP):tor:Privacy & Tech Tips · @RTP
2616 followers · 3880 posts · Server fosstodon.org
vPierre · @vPierre
18 followers · 477 posts · Server mas.to
(RTP):tor:Privacy & Tech Tips · @RTP
2618 followers · 3880 posts · Server fosstodon.org

By monitoring power consumption on a device, researchers were able to compromise encryption process via side channel (attack).


thehackernews.com/2022/03/rese

#infosec #cybersecurity #encryption #crypto #security #news #research #tech #sidechannel

Last updated 4 years ago

(RTP):tor:Privacy & Tech Tips · @RTP
2619 followers · 3880 posts · Server fosstodon.org
Julien M. · @julm
485 followers · 4935 posts · Server framapiaf.org


> Prime+Probe 1, 0: Overcoming -based Defenses
> first browser-based side-channel which is constructed entirely from Cascading Style Sheets () and , and works even when script execution is completely blocked.
arxiv.org/abs/2103.04952

#html #css #attack #sidechannel #browser #javascript #cybersecurity

Last updated 5 years ago

Julien M. · @julm
485 followers · 4935 posts · Server framapiaf.org

« The Sound of Silence: Security Vulnerabilities from Secret Integration Channels in Projects »
«  fixes spotted before release with attack on...developer mailing lists »
« For these , our approach provides a temporal advantage of 2 to 179 days to design before public takes place, and fixes are rolled out. »
theregister.com/2020/09/04/lin
arxiv.org/pdf/2009.01694.pdf

#disclosure #exploits #vulnerabilities #sidechannel #security #kernel #linux #opensource #mining

Last updated 5 years ago