/?pid=12224

Updated:04:48 AM EST Jan 30


this is ggmania.com subsite How a Hacker Can Break Into Your Laptop With Just an iPhone - TechAmok

How a Hacker Can Break Into Your Laptop With Just an iPhone - [security]
02:07 AM EST - Dec,23 2013 - post a comment

That gentle hum of your laptop could be leaking your most sensitive documents. That's according to three of Israel's most respected cryptologists, who published a report this week outlining how they were able to extract data from a running laptop just by listening to the sounds it makes. Which only goes to show: No matter what you do–and no matter how serious your encryption–there will always be a way for a hacker to pilfer your data. Whether they do it over WiFi or bluetooth–and now via sound–your precious information is never truly safe. "Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components," write Adi Shamir, Eran Tromer and Daniel Genkin in their report, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. "These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer, and in particular leak sensitive information about security-related computations."
The three researchers tested the theory on a laptop with a 4096-bit RSA encryption–which, in layman's terms, is an incredibly tough code to crack. When the key to decrypt the code is entered into the computer, the computer runs a series of protocols to unlock the encrypted data, and the CPU makes a noise. The researchers then placed a mobile phone 30 centimeters from the target laptop, and pointed the phone's internal microphone towards the laptop's fan vents.

By parsing the sounds, the researchers proved a hacker could theoretically re-architect the encryption key, and later hack into the computer.

The whole attack could be packaged into a software "app" requiring no special hardware or knowledge. An attacker would install this software, reach physical proximity to the target computer under some pretext, and place the phone appropriately for the duration of the attack. For example, in a meeting, the attacker could innocuously place his phone on the desk next to the target laptop…and obtain the key by the meeting's end. Similar observations apply to other mobile devices with built-in microphones, such as tablets and laptops.


Add your comment (free registrationrequired)

Short overview of recent news articles

Jan,30 2026 NVIDIA GeForce 591.86 WHQL Driver
Jan,30 2026 iOS 26.3-Important New iPhone Location Privacy Feature Coming Soon
Jan,29 2026 I Made the Ultimate Steam Machine Before Valve
Jan,29 2026 Wardriver - Official Trailer (2026) Dane DeHaan, Sasha Calle,
Jan,28 2026 Apple Intros Improved AirTag
Jan,28 2026 US Version of TikTok off to Bumpy Start; Competitors Surge
Jan,28 2026 Google Chrome no longer needs you, as Gemini takes the driving seat
Jan,27 2026 Premium Subscriptions Coming to Facebook, Instagram, WhatsApp
Jan,25 2026 Windows 11 Best For Gaming? Windows 11 25H2 vs. Windows 10
Jan,24 2026 Microsoft Says Uninstall This Windows Update Immediately (KB5077744
Jan,22 2026 Xbox Developer Direct Livestream 2026 | Fable, Forza Horizon 6,
Jan,22 2026 Iridium Begins Testing its own Satellite Service for Phones
Jan,22 2026 AMD Releases Adrenalin Edition 26.1.1 WHQL Drivers
Jan,18 2026 AI in 2050
Jan,17 2026 iOS 26.2 Fixes Major Security Flaws
Jan,17 2026 Google Links its AI to Your Gmail and Photos for "Personal
Jan,17 2026 Fastest Koenigsegg v Fastest Bugatti: DRAG RACE
Jan,17 2026 Creating a 48GB NVIDIA RTX 4090 GPU
Jan,14 2026 CES was frickin weird, guys
Jan,12 2026 Lee Cronin's The Mummy - Official Teaser Trailer (2026) Jack
Jan,12 2026 Ferrari SF90 XX v Xiaomi SU7 Ultra: DRAG RACE
Jan,10 2026 Welcome to the Wasteland - Fallout (American TV series) fan video
Jan,09 2026 GOOD LUCK, HAVE FUN, DON'T DIE Trailer 2 (2026) Sam Rockwell
Jan,07 2026 NVIDIA Releases GeForce 591.74 WHQL Drivers with DLSS 4.5 Support
Jan,07 2026 Predator: Badlands Exclusive Deleted Scene (2025)
Jan,06 2026 Greenland 2: Migration - Official Trailer 3 (2026) Gerard Butler,
Jan,05 2026 The Best Laptops of 2025 - For Gaming, Creators & Students!
Jan,05 2026 Punkt Updates its Privacy-Focused Smartphone
Jan,05 2026 Clicks Launches New Ways to Add a Physical Keyboard to Your Life
Jan,05 2026 Building a PC for the First Time
Jan,03 2026 Building a PC in 2026
Jan,02 2026 I want this phone so bad... - Samsung Galaxy Z TriFold
Jan,02 2026 The Real Finewine Strikes Again: Ryzen 5600X, 5700X & 5800XT Revisit
Jan,02 2026 Nokia N8 Symbian Re-Awakened With Passion
Jan,02 2026 Europe Forces Apple to Open up More of iOS
Jan,02 2026 Must have Privacy and Security Tweaks: 2026 Edition
Jan,01 2026 How Did RAM Get So Expensive?!
Dec,31 2025 GeForce RTX 5090 prices to soar to $5,000 as NVIDIA and AMD prep GPU
Dec,30 2025 Hacker arrested for KMSAuto malware campaign with 2.8 million
Dec,29 2025 Killer Whale - Official Trailer (2026) Virginia Gardner, Mel
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs