POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
jim bell
jdb10987 at yahoo.com
Wed Aug 5 12:44:32 PDT 2020
For some reason I just noticed this posting.
One partial solution to exfiltrating information by LEDs would be to design the LEDs with capacitors across them, greatly reducing the rate of change of intensity. This could also be retrofitted after assembly.
In 1977, after building a "Dyna-Micro" Single-board computer (highlighted in Radio-Electronics magazine) I noticed that a nearby AM radio could easily pick up RF from it. If anything, this is potentially an even more useable kind of surveillance, because it doesn't necessarily require intrusion into a computer room or building.
Jim Bell
On Tuesday, May 5, 2020, 06:04:29 AM PDT, grarpamp <grarpamp at gmail.com> wrote:
[trim]
LED-it-Go - exfiltrate data from air-gapped systems via an HDD's activity LED
[trim]xLED - use router or switch LEDs to exfiltrate data
[trim]
CTRL-ALT-LED - steal data from air-gapped systems using keyboard LEDs
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2319 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200805/d791c6be/attachment.txt>
More information about the cypherpunks
mailing list