"Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations... Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away. Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped attacker need merely touch the target computer with his bare hand, or get the required leakage information from the ground wires at the remote end of VGA, USB or Ethernet cables."
"You type your entire message in Gmail and then you click on the Mailvelope lock icon. Yes, your email message is encrypted... Yes, this makes you feel warm and fuzzy because you're using encryption until you understand that, yes, Google still has the pre-encrypted message sitting on their servers. Not only this, but they saved multiple copies while you were typing your message."
And from another article by the same author (see link within the page below):
"Last week I composed an email... I wrote and rewrote the email several times before finally giving up and discussing the issue face to face. The message was never sent and was immediately discarded from the "Drafts" folder in my Gmail so imagine my horror when the downloaded MBOX contained this message. Not only that but nineteen different iterations of the email were saved and available for download from my account... Moreover I found that this was not only the case for unsent and discarded email. This was indeed the same for every email message that I had sent during that week."
With luck there will be a new project of that nature...
- Shopping bags including reusable 'green’ bags
- Fresh fruit and vegie bags
- Bread bags
- Biscuit packaging and confectionery packaging
- Rice & pasta packets and frozen food bags
This type of packaging is a large proportion of my previously-non-recyclable waste, so I'm very happy about this.
The attached link describes their recycling program. The fact that you can't tell this from the link is a combination of Coles having useless web developers and Google allowing sod-all customisation of link summaries (even Facebook does that better). <rant>
Funds are being raised at http://www.indiegogo.com/projects/the-truecrypt-audit and https://www.fundfill.com/fund/TrueCryptAudited
Errata Security: No, #Anonymous can't DDoS the root DNS servers
(Notice how while the map indicates the only U.S. "K" server is in Florida, but my traceroute appears to go to Virginia; the map i
Adblock Plus for Google Chrome™ (Beta) - Chrome Web Store
Ads were yesterday! The successful extension Adblock Plus is now available for Google Chrome™.
New leukemia treatment exceeds 'wildest expectations'
Doctors have treated only three leukemia patients, but the sensational results from a single shot could be one of the most significant advan
How is Perl's @INC constructed? (aka What are all the ways of affecting ...
up vote 27 down vote favorite. 10. share [fb] share [tw]. What are all the ways of affecting where Perl modules are searched for? or, How is
US man impaled through eye with pruning shears - Telegraph
An 86-year-old Arizona man is lucky to be alive after he accidentally impaled himself with pruning shears.
Twice the height of the Empire State - EnviroMission plans massive solar...
The mammoth 800-plus metre tall tower will instantly become one of the world's tallest buildings. Its 200-megawatt power generation capacity
Crochet Spot - Crochet Patterns, Tutorials and News
Crochet Spot is a welcoming place to get crochet patterns, tutorials and crochet news.
the quickest and best method for cooking vegetables
As much as I love Heston Blumenthal, he isn’t exactly a minimalist type of cook. I suspect old Hesto would rather quit cooking all together