A security researcher found a way to steal data from a PC through its power supply.
Cyberattack Steals PC Data Through Its Power Supply : Read more
Cyberattack Steals PC Data Through Its Power Supply : Read more
The scheduled forum maintenance has now been completed. If you spot any issues, please report them here in this thread. Thank you!
The author lacks imagination. This data rate is more than fast enough for nuclear launch codes, encryption keys, or certain other extremely high-value data.However, this attack wouldn't be particularly effective in a real-life scenario. Although the success rate is high, the data rate of the attack is a measly 50 bits per second, or equivalent to about 22.5 kB per hour. That works out to about 10,000 words stored in plain text.
Yeah, we had this whole discussion in the comments of the previous article (steal data from a PC through fan vibrations ).Before you can send data over audio or visual air-gap side-channels, you also need access to the data on the system itself. All the side-channels in the world won't do you much good if you cannot beat access controls and encryption.
In a proper air-gapped system, you shouldn't have access to USB ports without extra layers of verification and supervision. Whatever external data you want to bring in would likely get screened and transferred to a separately approved USB key to prevent hidden malware. Ideally, the whole system would also be locked away in a separate room from where people access the monitor, PS/2 keyboard and mouse.Basically, you need a vector to get malware into the target machine, such as an infected USB stick used by a witting or unwitting insider.
Yeah, of course. It was just a simple example that everyone can understand.In a proper air-gapped system, you shouldn't have access to USB ports without extra layers of verification and supervision.
Oh, you're not being nearly paranoid enough. No, I submit that the machine and its windowless room should be in a two-layer Faraday cage, so it remains protected even while the operator is entering & exiting. The machine, itself should be locked in another cage, that prevents physical access.Ideally, the whole system would also be locked away in a separate room from where people access the monitor, PS/2 keyboard and mouse.
Instead of making a high-pitched noise and hoping it drowns out the PSU, it'd be better to look at the spectral distribution of the PSU and target those specific bands via some combination of active and passive means.Solution 1
Create audio distortion on the 20khz - 20Mhz range.
Something is simple as a mechanism for blowing a dog whistle automatically
Now you're talkin'! And put a Xenomorph in there, to guard it, in case the intruder gets past the sharks.Solution 2
Place the computer in a vacuum.
You can't hear coil whine or screams in space.
But take care not to fry the guard-alien.Applying a black coating and using an ammonia in a loop heat pipe should be sufficient.
Peltier cooling also comes to mind.
This is good, except requires network connectivity. However, plenty of workloads don't, such as computing digits of Pi.Solution 3
Mine bitcoin/altcoins to keep your power supply at a steady power state.
Not a maxed out power supply (that would be bad) but one that is incapable of being given any more work due to GPU and CPU being at 100%.
Not working, for me.