98
this post was submitted on 05 Oct 2025
98 points (99.0% liked)
Hardware
4493 readers
79 users here now
All things related to technology hardware, with a focus on computing hardware.
Rules (Click to Expand):
-
Follow the Lemmy.world Rules - https://mastodon.world/about
-
Be kind. No bullying, harassment, racism, sexism etc. against other users.
-
No Spam, illegal content, or NSFW content.
-
Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.
-
Please try and post original sources when possible (as opposed to summaries).
-
If posting an archived version of the article, please include a URL link to the original article in the body of the post.
Some other hardware communities across Lemmy:
- Augmented Reality - !augmented_reality@lemmy.world
- Gaming Laptops - !gaminglaptops@lemmy.world
- Laptops - !laptops@lemmy.world
- Linux Hardware - !linuxhardware@programming.dev
- Mechanical Keyboards - !mechanical_keyboards@programming.dev
- Monitors - !monitors@piefed.social
- Raspberry Pi - !raspberry_pi@programming.dev
- Retro Computing - !retrocomputing@lemmy.sdf.org
- Virtual Reality - !virtualreality@lemmy.world
Icon by "icon lauk" under CC BY 3.0
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I always love these absolutely worthless hacks. And I mean that. My favorite was the one that broke encryption by using power draw on the CPU.
This really isn't worthless.
The chances someone may use it against you may be low but a committed attacker against a secure target will rely on stuff like this.
It's more in the realm of espionage than stealing your credit card number but this shit happens.
How many times you think a state government uses this vs the thousands of cameras, warrants, a well placed USB stick on the desk, and monitoring the war thunder forums?
I get what you're saying, but in the grand scene of things, even at the state level, these are not how state agencies are spying on you in practical terms.
The effort to just get this executable running undetected in the background for such a low value attack just doesn't make sense to spend resources on.
Very often. Software supply chain attacks are the most common method of infiltration these days, and even in environments with compliance requirements people are very laissez-faire about what they install.