tempest back doors
Major Variola (ret)
mv at cdc.gov
Thu Dec 9 19:04:39 PST 2004
At 07:46 PM 12/9/04 -0500, Steve Thompson wrote:
> --- "Major Variola (ret)" <mv at cdc.gov> wrote:
>> >Perhaps I am stupid. I don't know how one would go about modifying
>> >application software to include a 'back door' that would presumably
>> >enhance its suceptibility to TEMPEST attacks. Isn't tempest all
about
>> EM
>> >spectrum signal detection and capture?
>>
>> You have your code drive a bus with signal. The bus radiates, you
>> 'TEMPEST' the signal, game over. Back in the 60s folks programmed
>> PDPs to play music on AM radios. Same thing. Dig?
>
>Fine. That's great as an example of transmitting data over a covert
>channel, but so what? As you suggest, people have been doing that with
AM
>radios since the 60's, although the folklore mentions the phenomenon in
>the context of monitoring the computer's heartbeat, purely as a
debugging
>technique.
The poster didn't understand how to backdoor a program using
unintentional RF as the channel. I told them. That's "so what"
More information about the cypherpunks-legacy
mailing list