[16629] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SSL/TLS passive sniffing

daemon@ATHENA.MIT.EDU (Janusz A. Urbanowicz)
Wed Jan 5 11:41:29 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 5 Jan 2005 12:07:35 +0100
From: "Janusz A. Urbanowicz" <alex@bofh.net.pl>
To: Andy Isaacson <adi@hexapodia.org>
Cc: Florian Weimer <fw@deneb.enyo.de>, cryptography@metzdowd.com
In-Reply-To: <20041224205637.GA31580@hexapodia.org>

 
> [1] Superconducting QUantum Interference Device, the Gibsonian gizmo
>     used by the dolphin in _Johnny Mnemonic_ to extract "80 *Gigabytes*!"
>     of information from the courier's brain-mounted memory module.

SQUID-s are not a 'Gibsonian gizmo', they are a real device, superensitive
magnetometers based on properties of Josephson junction. For more info, see
<http://en.wikipedia.org/wiki/SQUID>. I guess a better reference, instead of
SQUIDs, in the threat model you discuss would be Van Eck phreaking or its
military incarnation i.e. TEMPEST. And moreover if TEMPEST is called into
view, there are many other ways the information can be leaked, than tapping
CPU's ALU.

Alex
-- 
mors ab alto 
0x46399138

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post