Secure Credit Card Station

Tim Sattarov stimur-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Thu Oct 3 03:40:16 UTC 2013


On 23/09/13 12:34 PM, Christopher Browne wrote:
> The hidden camera idea is *much* better as it is effective without there being
> any need to compromise any software.  Go ahead, get the device certified,
> however you like; that'll improve your confidence, whilst it doesn't do anything
> to help against the exploit that'll actually bite...
>

 From here: 
http://www.cs.berkeley.edu/~tygar/papers/Keyboard_Acoustic_Emanations_Revisited/tiss.preprint.pdf 
<http://www.cs.berkeley.edu/%7Etygar/papers/Keyboard_Acoustic_Emanations_Revisited/tiss.preprint.pdf>

"In ground-breaking research,
Asonov and Agrawal showed that it is possible to recover text from the 
acoustic
emanations from typing on a keyboard [Asonov and Agrawal 2004]."

Malicious user can capture information by many ways.

it is always a balance, how sensitive information is and how easily it 
can be captured. Cost of protection and expenses of stealing.

Tim
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list