Jim Bell's note: In late 1977, I built a single board microprocessor trainer called a Dyna-Micro. https://www.google.com/search?q=%22dyna+micro%22&oq=%22dyna+micro%22&aqs=chrome. .69i57j46i175i199i512j0i22i30l5j0i10i22i30.8593j1j16&client=ms-android-motorola- rvo3&sourceid=chrome-mobile&ie=UTF-8#imgrc=TPvWtUel0XoNkM At the time, I noticed that if I turned on the AM radio, running the computer caused varying bleeps and bloops to be received. Probably then and before, owne rs of primitive PCs like Altair noticed the same thing. A few years later, I first heard of the idea called tempest, the practice of shi elding computers to avoid transmitting information by radio. Even later, in the early 2000s, I read a (even then, old) book by ex MI-5 person Peter wright, called Spycatcher, that described how they could remotely determi ne what radio station a radio was receiving, by detecting its local oscillator's frequency. So-called heterodyne radios work by generating a local oscillator f requency, then nonlinearly mixing that with the signal from the antenna, and the n filtering the difference through an IF (intermediate frequency) filter. https://www.google.com/search?q=%22dyna+micro%22&oq=%22dyna+micro%22&aqs=chrome. .69i57j46i175i199i512j0i22i30l5j0i10i22i30.8593j1j16&client=ms-android-motorola- rvo3&sourceid=chrome-mobile&ie=UTF-8#imgrc=TPvWtUel0XoNkM From that: 'Wright examines the techniques of intelligence services, exposes their ethics, notably their "eleventh [1]commandment", "Thou shalt not get caught." He describ ed many MI5 electronic technologies (some of which he developed), for instance, allowing clever spying into rooms, and [2]identifying the frequency to which a s uperhet receiver is tuned. " ----------- HertzBleed Is A New CPU Hack Affecting Just About Everybody [3]https://share.newsbreak.com/1ay58kwf Unlike more traditional ways to hack information, side-channel attacks rely on t hese signatures to try to infer what information was being processed. You can th ink of it kind of like guessing your presents before your actual birthday: a ste reotypical “hacker” would think of ever-more sneaky ways to simply open the wrap ping paper, but someone using a side-channel attack would be giving it a shake, feeling the edges, and estimating the weight. Hertzbleed is not by any means the first such attack to be discovered – side-cha nnel attacks have been around for [4]more than two decades at this point – it ha s a few extra capabilities that haven’t been seen before. It can be deployed rem otely, making it much easier to use than previous side-channel attacks, and it a lso works on “constant time” mechanisms – that is, code specifically designed to eliminate one of the biggest clues for a would-be hacker, the length of time a process takes to complete. And the really bad news is, you’re almost certainly affected. Certainly, [5]all Intel processors are susceptible to Hertzbleed, as are [6]dozens of AMD chips. A nd even if your personal computer, laptop, tablet or phone doesn’t use those aff ected processors, thousands of servers across the planet do – servers which, as a matter of course, store your data, process your information, and run the servi ces we depend on every day. References 1. https://en.wikipedia.org/wiki/Ten_Commandments 2. https://en.wikipedia.org/wiki/Operation_RAFTER 3. https://share.newsbreak.com/1ay58kwf 4. https://www.newscientist.com/article/2324748-what-is-the-hertzbleed-computer-chip-hack-and-should-you-be-worried/ 5. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00698.html 6. https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1038