BitShares Forum
Main => General Discussion => Topic started by: MJK on July 15, 2015, 01:28:21 pm
-
Israeli Security Lab Using Electromagnetic Waves to Extract Private Keys
https://hacked.com/israeli-security-lab-using-electromagnetic-waves-extract-private-keys/
In 2.0 our multiig would help to prevent this, correct?
-
Multisig could potential make it a little safer as you need to "attack" at two different locations ..
I am sure that ECC implementions can be made a alot more robust against timing attacks like those ...
for example, the TreZor had some similar issue 6 months ago and the devs fixed it algorithmically
-
trezor user not affected?
-
http://www.reddit.com/r/TREZOR/comments/31z7hc/extracting_the_private_key_from_a_trezor_with_a/
-
http://www.reddit.com/r/TREZOR/comments/31z7hc/extracting_the_private_key_from_a_trezor_with_a/
Manual bruteforce-- not a electromagnetic wave. . . .
Are physical devices with no wireless capabilities affected?
-
Manual bruteforce-- not a electromagnetic wave. . . .
Are physical devices with no wireless capabilities affected?
physically the same thing ... if (AC) current passes through a wire, a magnetic field is induced. Hence you can either grab voltage directly or you can see it in the air as magnetic field ..
that's why ethernet cables have several layers of shielding .. to not only prevent radiation away from the cable but also prevent "smog" inducing extra current in the cable ..
in short: physical devices with no wireless capabilities are still affected. ... unless you have bough a trezor in the pre-sale which comes with a metallic case .. (issue still exists, because you need to plugin a cable)