• Orvanis@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 year ago

    From a tech perspective, insanely clever to use modern phones rolling shutter mode to sample significantly more data points.

    From a “is this going to cause problems for the average person” perspective - not even close. Requires 65 minutes of recorded, stable footage. The camera must be < 6 feet away if the lights are on, and the cryptography algorithm must be running during that magic hour of recording…

    It does enable remote attacks, but only if all very specific requirements are met, and it requires you have access to a camera for a long period of time that is perfectly positioned.

  • peanuts4life@beehaw.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Yikes! I wonder how isolated the led has to be to the CPU power supply to prevent this sort of attack!

    • cmnybo@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Placing a capacitor in parallel with the LED should be sufficient to prevent it. That would form a low pass filter when combined with the current limiting resistor for the LED.

      The attack is not really practical though. The smart card has to be read for 65 minutes while recording the power LED. The cards are normally only read for a fraction of a second.