22 Jun
1993
22 Jun
'93
9 a.m.
persuade a single diode to be noisy yet. Anyhow, I turned to the simplest white noise source that I have, which happens to be a radio tuned to a dead channel. . . What other method could be used to attack this except for the obvious tempest attack on the host computer?
Well, the most obvious is for the attacker to TRANSMIT on that frequency. Then they control the 'random' data you are getting. John