How to black out a computer that is not networked at all?

Source: Internet
Author: User

In 2014 Sony was hacked by North Korean hackers, and all the confidential information was almost swept away. Legend has it that employees pulled out the cable at the last minute to barely keep the "underwear". This "cable extraction" approach seems to cure all ills. However, as long as the network is broken to ensure that the information on a computer peace of mind? (Of course not, otherwise there are so many not white to write it ...) )

There are three ways to get a key on a computer all the time:

1, directly get this computer, and then enter the Trojan virus to steal . (This slightly lowb method risk is: If the computer owner "caught in bed", angry and alarm, you need a hacker has a certain escape skills)

2, through the Internet intrusion target computer, Remote Installation Trojan virus, steal the key. (Most hackers will use this method, while ensuring their own and personal safety)

3, if the target computer is not networked, you need to be able to access the Internet media (such as a USB stick) to the virus into the target computer . (This method is full of force, technical difficulties, visual inspection only the United States to attack the Iranian nuclear power plant, such as a few successful cases)

From today onwards, these methods have been weakened.

Israel's white hat hacker (security researcher) has developed a high-energy approach by placing a large "stethoscope" on your next door and capturing your password information based on the electromagnetic waves emitted by your computer as it works.

"The electromagnetic wave detector that can hear the computer talking to himself."

The inverse of this method of attack is:

1, the speed is odd fast, only a few seconds, the key hand.

2, does not involve the password deciphering, but directly captures the password plaintext. The so-called walls have ears, Tannangquwu.

3, does not need the computer networking, also does not need to contact "the victim computer". Have not seen a strike, the outcome has been sentenced.

It costs only $3000 to make this device. It captures the electromagnetic waves that work in the surrounding computer accurately and amplifies the analysis.

So, what can this "detector" actually hear?

"The computer being monitored."

The researcher tried to send an encrypted e-mail to the victim's computer. The decryption operation is performed in the background while the computer is opening the message. And it is this short few seconds of the decryption process, emitted by the electromagnetic waves carried "The Secret of the Universe." The probe analyzes the electromagnetic waves of these seconds and discovers that when a narrow-band signal is present, it marks the decryption of a password. By putting these narrow-band signals together for analysis, the ciphertext information is so easily "flowing" out.

The researchers walked through a 15-centimetre-thick wall and captured 66 decryption processes. It took only 3.3 seconds to get the key.

"Fluctuations of the electromagnetic wave, the mark is a narrow frequency signal"

The experiment is tantamount to discovering the "gravitational waves" of the hacker community, opening up new brain holes for hackers. This indicates that the computer will talk to himself at work, so long as you can understand what the computer is saying, there is no secret in front of you. Using the same principle, you can even analyze other information generated by your computer's work, such as your bank card password and private chat content.

"This attack is likely to go out of the lab quickly and become a popular attack method," said researcher Tromer. Hackers will explore cheaper devices and further reduce the cost of attacks. "However, if hackers want to make this kind of device, they need to overcome a big hurdle, which is to filter out the background noise." In countless electromagnetic waves to analyze what is the computer work issued, like in a noisy party heard a girl whispering. Achieving this posture requires a fairly strong physical basis, not the traditional dead House program apes can handle.

If this attack will become a hacker's "standard" in the future, it is really a very small fear. Traditional offensive means, through the Internet, hackers are easy to leave traces of your computer, these traces can be used as their evidence, and the electromagnetic waves are bugged, but there is no way to detect, so want to know that they are "monitoring" is almost impossible.

As Tromer said:

Our computers are protected by many institutions in the cyber world, but they are almost naked in the physical world.

When you're still struggling with what kind of mosaics you're playing, hackers have already been looking at your skin and bones. The privacy of each of us is even more fragile in the face of this dimension-reduction attack. Even to the point of "want to men who, conceal".

After careful consideration, in order to prevent the information stolen by hackers, the correct usage of the computer is as follows:

Source: Lei Feng Net

How to black out a computer that is not networked at all?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.