Reply to post:

Stray electronic-magnetic leaks used to harvest PC crypto keys

Dan Wilkie

So am I understanding correctly that to pull off this attack, they had to get the target to decrypt a carefully chosen cyphertext first, several times, and THEN they could decrypt whatever it was?

It seems a little impractical for anything beyond nation states who can already do this, or is that just me?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon