Computer Related > Novel hacking techniques Computing Issues
Thread Author: sherlock47 Replies: 9

 Novel hacking techniques - sherlock47
tinyurl.com/yac84bqh


I found this interesting - not sure anyone else will!




 Novel hacking techniques - No FM2R
I think I first worked on TEMPEST/EMS for GCHQ in 1989. Zero or others may have been before me.
 Novel hacking techniques - Zero
Yup, This is just a stunt. RF emitted from electronic components has been hacked ever since the days of the TV license vans.

They alway fails on loads of points. . 1/ more than one computer in use screws up the output. 2/ A faraday cage, or a tempested PC emits no RF. 3/ you need to be close.

Its such a well understood vulnerability that its no longer one.

 Novel hacking techniques - No FM2R
"It's".

Just sayin'.
 Novel hacking techniques - tyrednemotional
...he should of known that....
 Novel hacking techniques - No FM2R
I'm going to lock the pair of you in a room with a machete and shoot the survivor.
 Novel hacking techniques - Zero
>> ...he should of known that....

I might of known he would whinge about it.
 Novel hacking techniques - No FM2R
Last edited by: VxFan on Wed 16 Dec 20 at 02:48
 Novel hacking techniques - smokie
I remember TEMPEST, from my early days. Not very well though. Wasn't it what the Americans used to use? We (Wang) had equipment in USAF bases here and I'm sure that was TEMPEST.
 Novel hacking techniques - Kevin
TEMPEST is the standard applied to electromagnetic shielding of electronic equipment. I'm pretty sure that it originated in the US but was then adopted by the UK and other allies.
I worked on a few projects for the MOD that specified TEMPEST certified kit. The first one was a digital data and telephony setup between the three allied sectors in West Berlin around 1985 or so.
Latest Forum Posts