Audio Eavesdropping Exploit Might Make That Clicky Keyboard Less Cool

Despite their claims of innocence, we all know that the big tech firms are listening to us. How else to explain the sudden appearance of ads related to something we’ve …read more Continue reading Audio Eavesdropping Exploit Might Make That Clicky Keyboard Less Cool

Does this theoretical salted-hash-sleep scheme mitigate timing attacks?

This question is purely theoretical, I have no intention of ever implementing this scheme in practice. I’m familiar with the shortcomings of sleeping as means of mitigating timing attacks. I’m more interested in this from the attacker’s pe… Continue reading Does this theoretical salted-hash-sleep scheme mitigate timing attacks?

Side-channel impacts of coil whine and related acoustical phenomena over time

I am aware of one paper (although I forget the name) in which an AES key is extracted from some meters away as a result of coil whine (potentially audible vibration of an inductor coil), but I can’t find any research which looks into acous… Continue reading Side-channel impacts of coil whine and related acoustical phenomena over time

Glitch Your Way to Reverse-Engineering Glory with the PicoEMP

PicoEMP EMFI tool

Most of our projects are, to some extent, an exercise in glitch-reduction. Whether they’re self-inflicted software or hardware mistakes, or even if the glitches in question come from sources beyond …read more Continue reading Glitch Your Way to Reverse-Engineering Glory with the PicoEMP

Is using a developer key to protect a REST API good practice?

I’d like to implement a RESTful API service over HTTP that developers can call from their server side environments.
I intend to use a cryptographically secure pseudo-random number generator (CSPRNG) to generate keys and then convert the bi… Continue reading Is using a developer key to protect a REST API good practice?