- cross-posted to:
- technology@beehaw.org
- cross-posted to:
- technology@beehaw.org
From a tech perspective, insanely clever to use modern phones rolling shutter mode to sample significantly more data points.
From a “is this going to cause problems for the average person” perspective - not even close. Requires 65 minutes of recorded, stable footage. The camera must be < 6 feet away if the lights are on, and the cryptography algorithm must be running during that magic hour of recording…
It does enable remote attacks, but only if all very specific requirements are met, and it requires you have access to a camera for a long period of time that is perfectly positioned.
sounds like a job for a hacked cam ;)
Reminds me of LEDs used to extract data out of airgapped networks: https://threatpost.com/blinking-router-leds-leak-data-from-air-gapped-networks/126199/ but different because that one requires software within the airgapped network to exfiltrate.
Didn’t there used to be network equipment that was vulnerable to data exfil from data status lights, or did I dream that up? Most data LEDs now just consistently blink.
Note to self - don’t add flashing LEDs to any security devices
Yikes! I wonder how isolated the led has to be to the CPU power supply to prevent this sort of attack!
Placing a capacitor in parallel with the LED should be sufficient to prevent it. That would form a low pass filter when combined with the current limiting resistor for the LED.
The attack is not really practical though. The smart card has to be read for 65 minutes while recording the power LED. The cards are normally only read for a fraction of a second.
Perhaps not the most practical of attacks, but still an impressive feat.