Wednesday, August 09, 2006

The Dark Side of Invention

Imagine all your keystrokes being transmitted to hacker sites through variations in the timing of keyboard event signals, and consequently network data packets, even if they're both encrypted.

It's similar in concept to identifying computers based on timing signatures, in that it relies on using data as a "carrier wave," and encoding or decoding further data based on the "time derivative" of the data flow.

0 Comments:

Post a Comment

<< Home