Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


1 posted on 07/08/2015 6:56:44 PM PDT by 2ndDivisionVet
[ Post Reply | Private Reply | View Replies ]


To: 2ndDivisionVet

I see more Lifelock ads for Beck,Rush and Hannity.


2 posted on 07/08/2015 6:58:46 PM PDT by TurboZamboni (Those who make peaceful revolution impossible will make violent revolution inevitable.-JFK)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

bfl


3 posted on 07/08/2015 7:01:32 PM PDT by CommieCutter
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

The military has had computers protected against this for decades. I believe they call it Tempest Shielding.


4 posted on 07/08/2015 7:03:53 PM PDT by I cannot think of a name
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

There’s no easy way to determine what process is causing a fluctuation in the CPU.

If you had enough processes running to max out the CPU it would be VERY difficult to sort anything out of the RF mess coming from it. A quiet CPU running a process would be like listening to someone walk across the floor in the apartment upstairs, a maxed out CPU would be like hearing the stomping feet of a dance party overhead...very hard to figure out what foot caused what stomp :-)

An SDR creating a mass of competing RF at the proper frequencies would also create problems for the snooper.


6 posted on 07/08/2015 7:26:04 PM PDT by Bobalu (If we live to see 2017 we will be kissing the ground)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet
Physical mitigation techniques of electromagnetic radiation include Faraday cages,” the team wrote on its website. “However, inexpensive protection of consumer-grade PCs appears difficult.

This is untrue. Think tinfoil hat.

7 posted on 07/08/2015 7:27:15 PM PDT by AndyJackson
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

Tempest, from the 1970s. Just goofle NACSEM 5100.

Nothing new here.


9 posted on 07/08/2015 7:35:17 PM PDT by bigbob (The best way to get a bad law repealed is to enforce it strictly. Abraham Lincoln)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

Physical access to your work site or computer can allow a number of attacks. The Evil Maid attack, and the hardware keyboard logger, are the most popular.

Physical security is, therefore, important. Keep your laptop in a safe when it is not in use.


10 posted on 07/08/2015 7:39:35 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

Gotta get me a Tempest machine.


12 posted on 07/08/2015 7:42:25 PM PDT by null and void (She who uses rope to contain reporters during her candidacy will use rope to hang them when in power)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

This is sort of hacking is DPA and SPA- differential power analysis and simple power analysis. Cryptography Research Inc. has countermeasures for dealing with this.


13 posted on 07/08/2015 8:07:31 PM PDT by Pelham (Deo Vindice)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

Here’s hoping BIbi has already slipped one into theOne’s golf bag and got a hold of the evil one’s blackberry info.


15 posted on 07/08/2015 8:25:52 PM PDT by Sgt_Schultze (If a border fence isn't effective, why is there a border fence around the White House?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet
Inexpensive protection of PCs is hard to do? Balderdash!!


18 posted on 07/08/2015 9:09:22 PM PDT by ProtectOurFreedom (For those who understand, no explanation is needed. For those who do not, no explanation is possible)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; ...

23 posted on 07/09/2015 10:46:54 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 2ndDivisionVet

Sounds like not using mobile devices or computers using wi-fi is the answer. Hard-wired computers avoid the problem. I do all my secure work (bank and credit card transactions) on my computer physically connected to the net.


24 posted on 07/09/2015 11:50:26 AM PDT by CedarDave (Bush vs. Clinton in 2016? If you have a 24-year old car, the bumper stickers are still good!)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson