Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As I read this paper, the attack used a training set on the target hardware with the exact antenna setup; then ran a test set on the exact same configuration to demonstrate key recovery. This seems like it would be much more difficult to execute in the wild on a random device at Starbucks.

- The device would have to be profiled ahead of time.

- There's nothing else running on the device but the key decryption at some point.

- The device is quite close to the detection apparatus (within 20 cm in the paper).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: