As I read this paper, the attack used a training set on the target hardware with the exact antenna setup; then ran a test set on the exact same configuration to demonstrate key recovery. This seems like it would be much more difficult to execute in the wild on a random device at Starbucks.
- The device would have to be profiled ahead of time.
- There's nothing else running on the device but the key decryption at some point.
- The device is quite close to the detection apparatus (within 20 cm in the paper).
- The device would have to be profiled ahead of time.
- There's nothing else running on the device but the key decryption at some point.
- The device is quite close to the detection apparatus (within 20 cm in the paper).