How Hackers Can Steal Secrets from Reflections

SciAm
Even with the best network security, your electronic data may not be safe from a determined hacker. Researchers have extracted information from nothing more than the reflection of a computer monitor off an eyeball or the sounds emanating from a printer. These attacks are difficult to defend against and impossible to trace.
Through the eyepiece of Michael Backes’s small Celestron telescope, the 18-point letters on the laptop screen at the end of the hall look nearly as clear as if the notebook computer were on my lap. I do a double take. Not only is the laptop 10 meters (33 feet) down the corridor, it faces away from the telescope. The image that seems so legible is a reflection off a glass teapot on a nearby table. In experiments here at his laboratory at Saarland University in Germany, Backes has discovered that an alarmingly wide range of objects can bounce secrets right off our screens and into an eavesdropper’s camera. Spectacles work just fine, as do coffee cups, plastic bottles, metal jewelry—even, in his most recent work, the eyeballs of the computer user. The mere act of viewing information can give it away.

More...

Comments