Old tempest used the electronic noise from the CRT itself to decode the signal, this paper is interesting in that it uses the HDMI cable as the transmission source, which is really cool!
I highly recommend the paper, if this threat factors into your activities some thoughts come to mind
Use a Skif
Use a shielded HDMI cable and ground the shield
Use a self contained laptop (and ground it) for your very sensitive data (less cable length, less radio transmission loops)
Don’t display passwords on your screen unless absolutely necessary
cyborganism@lemmy.ca
on 05 Aug 2024 12:36
collapse
Besides, with the next Windows 11 on computers with a neural network chip, co pilot will be taking screenshots regularly to send to an AI. So you’ll want to not display any passwords at all.
I can’t imagine a single corporation or government that wont cut a tattle tale like co-pilot out of its system… imagine the data-leak, ransom-ware, possibilities! HIPPA violations for everyone
magic_smoke@links.hackliberty.org
on 05 Aug 2024 13:11
collapse
Yeah for some reason I don’t see it making its way to builds of Enterprise LTSC or Server (esp. not Server Core.)
cyborganism@lemmy.ca
on 05 Aug 2024 14:20
collapse
No it’s definitely a desktop feature. Not for servers. There will probably be a way to disable it in pro versions. But for the everyday users? Nah. They’ll siphon all the information they can to sell it.
threaded - newest
Using AI for hacking? Reality is more and more cyberpunk every day.
arxiv.org/pdf/2407.09717
The paper- Deep-Tempest
en.wikipedia.org/wiki/Tempest_(codename) Tempest 2 - Bugaloo
Old tempest used the electronic noise from the CRT itself to decode the signal, this paper is interesting in that it uses the HDMI cable as the transmission source, which is really cool!
I highly recommend the paper, if this threat factors into your activities some thoughts come to mind
Besides, with the next Windows 11 on computers with a neural network chip, co pilot will be taking screenshots regularly to send to an AI. So you’ll want to not display any passwords at all.
I can’t imagine a single corporation or government that wont cut a tattle tale like co-pilot out of its system… imagine the data-leak, ransom-ware, possibilities! HIPPA violations for everyone
Yeah for some reason I don’t see it making its way to builds of Enterprise LTSC or Server (esp. not Server Core.)
No it’s definitely a desktop feature. Not for servers. There will probably be a way to disable it in pro versions. But for the everyday users? Nah. They’ll siphon all the information they can to sell it.
Can you imagine microsoft one-drive exfiltrating HIPPA data to MS cloud with their “opt-out” auto-enabling?