In theory (or in TLA practice), you can do that in real time with a laser.The comments on 'talking around HDDs would leave imprints on them' reminds me of the few Fringe episodes where they essentially hooked up equipment to residential windows and listened to the data on them like an old phonograph.
This might blow your mind, but you can actually get malware onto an air-gapped PC without personally having physical access to it!Uh, you have access to the machine long enough to install this mission-impossible setup on not only the system but the phone as well, you could just take whatever data it is you're after there, Hoss.
This might blow your mind, but you can actually get malware onto an air-gapped PC without personally having physical access to it!
Again, has nobody read about Stuxnet? That's exactly what they did! In fact, they managed to cross two air gaps! ("they" is CIA and Mossad, in this case.)
As for hacking cell phones, governments are doing that all the time.
I thought so too, but perhaps to eavesdrop on someone typing in a password?By their own admission, this doesn't overcome the air-gap because it requires that you have contact with the computer to install malware in the first place. If they have no access to the computer in the 1st place, this doesn't work. If they do have access to the computer in the 1st place, this is totally unnecessary.
My father in law does cyber security work for the government. They aren't allowed to talk about classified information around PC's because there have been studies where the vibration form the air could leave imprints onto the hard drives! I was skeptical at first, but then he had a document he showed me about it and my jaw just dropped.
Uh, no. That's far too low-bandwidth and much too susceptible to interference.
The attacker(s) do not personally need to have accessed the target computer. They just need to infect some USB drive(s) that eventually make their way onto the target computer/network. If they were to try to use the same USB sticks to exfiltrate the target data, they have to count on those USB sticks making it back to a internet connected device. And they'd only get a single snapshot of data per successful attack.Correct me if I'm wrong, but did they not still have to infect the first computer in that instance using an insider with a USB drive containing the malware? That would still constitute "physical access" even if they're using an intermediary.
I have read about that whole thing, but it's been a while. I didn't know there were two separate air gaps in that instance.
It could be an unwitting intermediary. Like, someone who finds an infected USB stick in the parking lot and decides to plug it into their PC to see what's on it.Correct me if I'm wrong, but did they not still have to infect the first computer in that instance using an insider with a USB drive containing the malware? That would still constitute "physical access" even if they're using an intermediary.
IIRC, the centrifuge is what they wanted to attack, but they're not networked (air gap 1). However, it had firmware that was updated by another PC that was also not network-accessible (air gap 2). So, the had to work out how to get the payload onto the the firmware updater PC, across that second air gap, and then that would be used to infect the firmware of the centrifuge.I have read about that whole thing, but it's been a while. I didn't know there were two separate air gaps in that instance.
It could be an unwitting intermediary. Like, someone who finds an infected USB stick in the parking lot and decides to plug it into their PC to see what's on it.
Interesting. I'll definitely need to read over the event again as far as what happened.IIRC, the centrifuge is what they wanted to attack, but they're not networked (air gap 1). However, it had firmware that was updated by another PC that was also not network-accessible (air gap 2). So, the had to work out how to get the payload onto the the firmware updater PC, across that second air gap, and then that would be used to infect the firmware of the centrifuge.
Thanks! I'm glad you know the term for it. Or at least one of the terms. Tesseract seems to always derail the conversation towards a specific media franchise...P.S. I like your hypercube.
I was going to call it a tesseract, but you never know how many people are familiar with the term.Thanks! I'm glad you know the term for it. Or at least one of the terms. Tesseract seems to always derail the conversation towards a specific media franchise...
I was going to call it a tesseract, but you never know how many people are familiar with the term.
As a teenager, I had a brief obsession with hyper-dimensional geometry.