Author Topic: Security Lab Using Electromagnetic Waves to Extract Private Keys  (Read 1367 times)

0 Members and 1 Guest are viewing this topic.

Offline xeroc

  • Board Moderator
  • Hero Member
  • *****
  • Posts: 12922
  • ChainSquad GmbH
    • View Profile
    • ChainSquad GmbH
  • BitShares: xeroc
  • GitHub: xeroc
Manual bruteforce-- not a electromagnetic wave. . . .
Are physical devices with no wireless capabilities affected?
physically the same thing ... if (AC) current passes through a wire, a magnetic field is induced. Hence you can either grab voltage directly or you can see it in the air as magnetic field ..
that's why ethernet cables have several layers of shielding .. to not only prevent radiation away from the cable but also prevent "smog" inducing extra current in the cable ..

in short: physical devices with no wireless capabilities are still affected. ... unless you have bough a trezor in the pre-sale which comes with a metallic case .. (issue still exists, because you need to plugin a cable)



Offline Bitcoinfan

  • Sr. Member
  • ****
  • Posts: 240
    • View Profile

Offline xeroc

  • Board Moderator
  • Hero Member
  • *****
  • Posts: 12922
  • ChainSquad GmbH
    • View Profile
    • ChainSquad GmbH
  • BitShares: xeroc
  • GitHub: xeroc
Multisig could potential make it a little safer as you need to "attack" at two different locations ..
I am sure that ECC implementions can be made a alot more robust against timing attacks like those ...
for example, the TreZor had some similar issue 6 months ago and the devs fixed it algorithmically

Offline MJK

  • Full Member
  • ***
  • Posts: 65
    • View Profile

Israeli Security Lab Using Electromagnetic Waves to Extract Private Keys

https://hacked.com/israeli-security-lab-using-electromagnetic-waves-extract-private-keys/

In 2.0 our multiig would help to prevent this, correct?