This is why Clive Robinson on Schneier's blog has been saying for close to a decade you need to think in terms of physics. Any way of moving matter or energy in any form to a receiver is a potential side channel. He inventee the term energy gapping to describe systems isolated from all forms of stray energy. Needless to say, it's difficult.<p>He and I worked out some detsils on the blog years ago. We saw acoustic attacks coming since they were used with lasers in Cold War. So, were emanation and light-based attacks. Even toilets, plumbing, and air ducts can leak things out. So, you start with a SCIF style design with power filters, EMSwC masking, audio masking, careful attention to anything coming/going, and no wireless anything allowed. Then you have to work on endpoint security ground up isolating and deprivileging everything. He also liked decomposing everything into resource-isolated functions with a hypervisor inspecting them on occasion.<p>Not much attack surface left at that point.