Secure Credit Card Station
Tim Sattarov
stimur-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Thu Oct 3 03:40:16 UTC 2013
On 23/09/13 12:34 PM, Christopher Browne wrote:
> The hidden camera idea is *much* better as it is effective without there being
> any need to compromise any software. Go ahead, get the device certified,
> however you like; that'll improve your confidence, whilst it doesn't do anything
> to help against the exploit that'll actually bite...
>
From here:
http://www.cs.berkeley.edu/~tygar/papers/Keyboard_Acoustic_Emanations_Revisited/tiss.preprint.pdf
<http://www.cs.berkeley.edu/%7Etygar/papers/Keyboard_Acoustic_Emanations_Revisited/tiss.preprint.pdf>
"In ground-breaking research,
Asonov and Agrawal showed that it is possible to recover text from the
acoustic
emanations from typing on a keyboard [Asonov and Agrawal 2004]."
Malicious user can capture information by many ways.
it is always a balance, how sensitive information is and how easily it
can be captured. Cost of protection and expenses of stealing.
Tim
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list