• Tar_Alcaran@sh.itjust.works
    link
    fedilink
    arrow-up
    7
    ·
    6 months ago

    It only works on chosen cyphertexts. They don’t specify is that means “any file, but the attacker has to get access to it” or if it means “this very specific file that we made in order to do this attack”.

    The former being much more dangerous than the latter of course.

    • HiddenLayer5@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      6 months ago

      According to the FAQ:

      The key extraction attacks finds the secret key bits one by one, sequentially. For each bit, the attacker crafts a ciphertext of a special form, that makes the acoustic leakage depend specifically on the value of that bit. The attacker then triggers decryption of that chosen ciphertext, records the resulting sound, and analyzes it.

      Which sounds to me like the latter?

    • qprimed@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 months ago

      but, you surely will agree, this is pretty devastating for any target. known cleartext may be trivial to insert into a targets workflow, and the confirmed recovery of a private key is potentially a massive payoff.

      the ability to process and extract sensitive information from the local environment has gotten seriously scary.