TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacker Turns Secure Computers into Secret-Spewing Radios

13 pointsby shahrycalmost 10 years ago

4 comments

stephengilliealmost 10 years ago
So if I understand this correctly, the &quot;hack&quot; works like this:<p><pre><code> 1. Install malware onto both the Target and the Receiver computers 2. Use existing circuitry inside the computer to create a software radio 3. Use the software radio created in Step 2 to transmit data between Target and Receiver </code></pre> This demonstration glossed over the difficulty of Step 1, something we saw in play with the Stuxnet virus.<p>This demonstration failed at Step 2, when a suitable circuit could not be located. Part of that is likely due to the large size of AM radio waves, and thus the large antennas required to generate them effectively. If microwave transmission were used, a suitable circuit would be much easier to find.<p>There are many questions about the viability of this &quot;hack&quot;, not the least of which are the ability to get enough power to the antenna to transmit data through several layers of metal insulation and electromagnetic noise.<p>Who knows - maybe the future of WIFI won&#x27;t be discrete hardware antennas, but software that can generate a software antenna from any circuit in the device on-demand. This might be useful for transmitting data short ranges, like just across a CPU core.
PhantomGremlinalmost 10 years ago
OMG. The sky is falling. From the article:<p><pre><code> But people in three-letter organizations will no doubt be interested. Assuming, of course, that they haven&#x27;t figured out the trick already. </code></pre> But, lo and behold, we&#x27;ve known about TEMPEST[1] since 2000, when information was publicly released in heavily redacted form. Here&#x27;s what it&#x27;s about:<p><pre><code> TEMPEST is a National Security Agency specification and NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. </code></pre> [1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Tempest_%28codename%29" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Tempest_%28codename%29</a>
shahrycalmost 10 years ago
&quot;Without a doubt, Cui&#x27;s research is impressive—and terrifying. Because it doesn&#x27;t rely on networks policed by firewalls, like Bluetooth or Wi-Fi, detecting these transmission is very hard. After all, there&#x27;s plenty of radio spectrum in which to hide. Cui quipped that with a simple AM radio, he defeated billions of dollars in firewall research.&quot;
评论 #10022335 未加载
baseballmerpeakalmost 10 years ago
Mind-blowingly outside the box. Network isolation is not enough. Wow.