Now you can hack into a computer by simply touching it

TECHi's Author
Opposing Author Arstechnica Read Source Article
Last Updated
TECHi's Take
Rocco Penn
Rocco Penn
  • Words 99
  • Estimated Read 1 min

Normally, breaking a PC’s security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make contact with a PC while you’re wearing a digitizer wristband, you can measure tiny changes in electrical potential that reveal even stronger encryption keys. You don’t even have to touch the system directly in some cases, researchers also intercepted keys from attached network and video cables.

Arstechnica

Arstechnica

  • Words 180
  • Estimated Read 1 min
Read Article

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers. There are several ways of attacking encryption systems. At one end of the spectrum, there are flaws and weaknesses in the algorithms themselves that make it easier than it should be to figure out the key to decrypt something. At the other end, there are flaws and weaknesses in human flesh and bones that make it easier than it should be to force someone to offer up the key to decrypt something. In the middle are a range of attacks that don’t depend on flaws on the encryption algorithms but rather in the way they’ve been implemented. Encryption systems, both software and hardware, can leak information about the keys being used in all sorts of indirect ways, such as the performance of the system’s cache, or the time taken to perform encryption and decryption operations. Attacks using these indirect information leaks are known collectively as side channel attacks.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Arstechnica

The FCC has approved America’s strongest-ever net neutrality rules
The FCC has approved America’s strongest-ever net neutrality rules

The strongest net neutrality rules that the United States has ever seen were approved by the FCC in a highly-anticipated…

Yahoo argues about crypto backdoors with the NSA
Yahoo argues about crypto backdoors with the NSA

It's been almost a year and a half since it was revealed that the NSA installed backdoors into several common cryptography…

The founder of 4chan has decided to leave the website
The founder of 4chan has decided to leave the website

Regardless of how you feel about 4chan, you can't deny how important the website has been in making the internet what…

T-Mobile introduces a brilliant new data rollover program
T-Mobile introduces a brilliant new data rollover program

T-Mobile may be an “Un-carrier” but it’s not a charity, it’s here to make money. So while its new Data Stash…