tempest | t2 infosec conference https://t2.fi Sun, 03 Sep 2017 20:19:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png tempest | t2 infosec conference https://t2.fi 32 32 Physical Side-Channel Attacks on PCs https://t2.fi/2017/09/03/physical-side-channel-attacks-on-pcs/ Sun, 03 Sep 2017 20:19:21 +0000 https://t2.fi/?p=1276 A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of …

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec conference.]]>
A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of the funniest publicly delivered presentations on gathering electromagnetic emanations.

Whether you are into emission security or collecting signals intelligence, we’re sure you will enjoy this talk.

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec conference.]]>
Electronic emanations explained https://t2.fi/2015/09/19/electronic-emanations-explained/ Sat, 19 Sep 2015 12:41:18 +0000 http://t2.fi/?p=870 Some of us are young/old enough to have spent too much time browsing through Cryptome archives in the late 90s and being amazed by documents about ECHELON and TEMPEST. Yet, it only took a couple of decades to see those unravel before our very eyes. Compared to many other security topics, open source information available on electromagnetic intelligence cannot …

The post Electronic emanations explained first appeared on t2 infosec conference.]]>
Some of us are young/old enough to have spent too much time browsing through Cryptome archives in the late 90s and being amazed by documents about ECHELON and TEMPEST. Yet, it only took a couple of decades to see those unravel before our very eyes.

Compared to many other security topics, open source information available on electromagnetic intelligence cannot be described as extensive nor comprehensive. Luckily, the talented researchers from Tel Aviv took public research to a new level by demonstrating their 300 USD pita bread.

The setup brings practical attacks to class rooms and coffee shops near you. This time paper and pencil are recommended for taking notes.

The post Electronic emanations explained first appeared on t2 infosec conference.]]>