Skip to main content

Home/ Electronic Everything!/ Group items tagged encryption

Rss Feed Group items tagged

Aasemoon =)

IEEE Spectrum: Torturing the Secret out of a Secure Chip - 0 views

  • A new chink has been found in the cryptographic armor that protects bank transactions, credit-card payments, and other secure Internet traffic. And although programmers have devised a patch for it, clever hackers might still be able to break through. The hack, presented in March at a computer security conference in Dresden, Germany, involves lowering the input voltage on a computer’s cryptography chip set and collecting the errors that leak out when the power-starved chips try and (sometimes) fail to encode messages. Crooks would then use those errors to reconstruct the secret key on which the encryption is based. More important, say the hack’s creators, the same attack could also be performed from afar on stressed systems, such as computer motherboards that run too hot or Web servers that run too fast.
jhonny bravo

Wireless Modem Hacking Software - 0 views

  •  
    Wireless field transmits data using tuner waves from one employment to another. The signalise carrying your information are transmitted over a open length sometimes Kilometers. Without plain guarantee measures in space, anyone with the good tools can gain out and encrypt, steal and taxi your accumulation. Vulnerable Wireless is the most unrefined comprise of intrusion to confidential networks.
1 - 2 of 2
Showing 20 items per page