• Daemon Silverstein
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    1 month ago

    Before opening the article, I was thinking of something really, really sophisticated involving high-pitched sound and microphones (e.g. coil whine modulation through I/O processes), electrical inductance and electromagnetic fields carefully modulated to directly interfere on CPU instructions, Van Eck Phreaking (something like TempestSDR but fancier), precision-grade voltage meters to try and identify ongoing CPU instructions through quick teeny-tiny microvolt fluctuations over the power grid but, no, it’s the old fashioned way of malware transportation: portable disks.