pita | t2 infosec hybrid competence center https://t2.fi Sun, 03 Sep 2017 20:19:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png pita | t2 infosec hybrid competence center https://t2.fi 32 32 Physical Side-Channel Attacks on PCs https://t2.fi/2017/09/03/physical-side-channel-attacks-on-pcs/ <![CDATA[Henri Lindberg]]> Sun, 03 Sep 2017 20:19:21 +0000 <![CDATA[Archive]]> <![CDATA[Talks]]> <![CDATA[emsec]]> <![CDATA[pita]]> <![CDATA[red-black]]> <![CDATA[sidechannel]]> <![CDATA[t2'15]]> <![CDATA[talks]]> <![CDATA[tempest]]> <![CDATA[Van Eck phreaking]]> https://t2.fi/?p=1276 <![CDATA[

A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of …

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec hybrid competence center.]]>
<![CDATA[

A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of the funniest publicly delivered presentations on gathering electromagnetic emanations.

Whether you are into emission security or collecting signals intelligence, we’re sure you will enjoy this talk.

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec hybrid competence center.]]>
Electronic emanations explained https://t2.fi/2015/09/19/electronic-emanations-explained/ <![CDATA[Henri Lindberg]]> Sat, 19 Sep 2015 12:41:18 +0000 <![CDATA[Talks]]> <![CDATA[pita]]> <![CDATA[t2'15]]> <![CDATA[talks]]> <![CDATA[tempest]]> http://t2.fi/?p=870 <![CDATA[

Some of us are young/old enough to have spent too much time browsing through Cryptome archives in the late 90s and being amazed by documents about ECHELON and TEMPEST. Yet, it only took a couple of decades to see those unravel before our very eyes. Compared to many other security topics, open source information available on electromagnetic intelligence cannot …

The post Electronic emanations explained first appeared on t2 infosec hybrid competence center.]]>
<![CDATA[

Some of us are young/old enough to have spent too much time browsing through Cryptome archives in the late 90s and being amazed by documents about ECHELON and TEMPEST. Yet, it only took a couple of decades to see those unravel before our very eyes.

Compared to many other security topics, open source information available on electromagnetic intelligence cannot be described as extensive nor comprehensive. Luckily, the talented researchers from Tel Aviv took public research to a new level by demonstrating their 300 USD pita bread.

The setup brings practical attacks to class rooms and coffee shops near you. This time paper and pencil are recommended for taking notes.

The post Electronic emanations explained first appeared on t2 infosec hybrid competence center.]]>