Now you can hack into a computer by simply touching it

TECHi's Author Rocco Penn
Opposing Author Arstechnica Read Source Article
Last Updated
TECHi's Take
Rocco Penn
Rocco Penn
  • Words 99
  • Estimated Read 1 min

Normally, breaking a PC’s security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make contact with a PC while you’re wearing a digitizer wristband, you can measure tiny changes in electrical potential that reveal even stronger encryption keys. You don’t even have to touch the system directly in some cases, researchers also intercepted keys from attached network and video cables.

Arstechnica

Arstechnica

  • Words 180
  • Estimated Read 1 min
Read Article

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers. There are several ways of attacking encryption systems. At one end of the spectrum, there are flaws and weaknesses in the algorithms themselves that make it easier than it should be to figure out the key to decrypt something. At the other end, there are flaws and weaknesses in human flesh and bones that make it easier than it should be to force someone to offer up the key to decrypt something. In the middle are a range of attacks that don’t depend on flaws on the encryption algorithms but rather in the way they’ve been implemented. Encryption systems, both software and hardware, can leak information about the keys being used in all sorts of indirect ways, such as the performance of the system’s cache, or the time taken to perform encryption and decryption operations. Attacks using these indirect information leaks are known collectively as side channel attacks.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Arstechnica

Apple won’t be announcing its television service next week after all
Apple won’t be announcing its television service next week after all

Those of you who have been anticipating the announcement of Apple's long-rumored subscription television service should prepare yourselves for disappointment.…

Kyocera is being sued by Microsoft for infringing on Android patents
Kyocera is being sued by Microsoft for infringing on Android patents

Despite being a direct competitor in the mobile market, Microsoft actually owns quite a few Android patents and isn't afraid…

Maybe default encryption for Android wasn’t such a good idea
Maybe default encryption for Android wasn’t such a good idea

While Android has supported disk encryption for a while now, Android 5.0 is the only version that implements it by…

The FCC has approved America’s strongest-ever net neutrality rules
The FCC has approved America’s strongest-ever net neutrality rules

The strongest net neutrality rules that the United States has ever seen were approved by the FCC in a highly-anticipated…