Editing Talk:2651: Air Gap
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 33: | Line 33: | ||
::: Maybe this helps? https://ieeexplore.ieee.org/abstract/document/5625426 [[Special:Contributions/172.70.142.21|172.70.142.21]] 06:51, 29 July 2022 (UTC) | ::: Maybe this helps? https://ieeexplore.ieee.org/abstract/document/5625426 [[Special:Contributions/172.70.142.21|172.70.142.21]] 06:51, 29 July 2022 (UTC) | ||
:::: Yes! [https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=1961&context=all_theses Figure 1.10 seems to suggest that frequencies above 10 Hz are filtered,] and that seems consistent with Figure 3.14, in that recovery time is a tenth of a second (though drop-off "cooldown" time is much shorter.) So if I remember my {{w|Binary Golay code|modem math,}} even with the most sophisticated coding, anything more than 640 bits per second should be impossible. [[Special:Contributions/172.69.33.225|172.69.33.225]] 07:39, 29 July 2022 (UTC) | :::: Yes! [https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=1961&context=all_theses Figure 1.10 seems to suggest that frequencies above 10 Hz are filtered,] and that seems consistent with Figure 3.14, in that recovery time is a tenth of a second (though drop-off "cooldown" time is much shorter.) So if I remember my {{w|Binary Golay code|modem math,}} even with the most sophisticated coding, anything more than 640 bits per second should be impossible. [[Special:Contributions/172.69.33.225|172.69.33.225]] 07:39, 29 July 2022 (UTC) | ||
β | |||
I'm almost tempted to suggest that this should be an (honourary) addition to the Cursed Connectors comic-collection. [[Special:Contributions/172.71.94.187|172.71.94.187]] 14:56, 28 July 2022 (UTC) | I'm almost tempted to suggest that this should be an (honourary) addition to the Cursed Connectors comic-collection. [[Special:Contributions/172.71.94.187|172.71.94.187]] 14:56, 28 July 2022 (UTC) | ||
Line 57: | Line 56: | ||
There are actually usecases for optical power links. For example electric field probes use this: https://www.raditeq.com/products/electric-field-probes/ | There are actually usecases for optical power links. For example electric field probes use this: https://www.raditeq.com/products/electric-field-probes/ | ||
--[[User:Casandro|Casandro]] ([[User talk:Casandro|talk]]) 08:10, 29 July 2022 (UTC) | --[[User:Casandro|Casandro]] ([[User talk:Casandro|talk]]) 08:10, 29 July 2022 (UTC) | ||
β | :Some drones can be recharged in the air by lasers, but that's a really obscure application only the military needs, and then only as a contingency backup in most cases, but there were flying demos by companies interested in the space over the past decade. [[Special:Contributions/172.70.211.88|172.70.211.88]] 22:09, 29 July 2022 (UTC) | + | ::Some drones can be recharged in the air by lasers, but that's a really obscure application only the military needs, and then only as a contingency backup in most cases, but there were flying demos by companies interested in the space over the past decade. [[Special:Contributions/172.70.211.88|172.70.211.88]] 22:09, 29 July 2022 (UTC) |
I think it might be possible to construct a scenario where this could have some security benefit, albeit not one that justifies such poor efficiency. Suppose you have an embedded system running off USB power to perform some cryptographic task, but the USB port the cable's plugged into is under the control of an attacker who has it instrumented to sample the power consumption at a high frequency. He can perform {{w|power_analysis}} if the load changes based on the operations performed by your device, but the setup in the comic should prevent information from leaking upstream in this manner. [[User:D5xtgr|D5xtgr]] ([[User talk:D5xtgr|talk]]) 19:44, 29 July 2022 (UTC) | I think it might be possible to construct a scenario where this could have some security benefit, albeit not one that justifies such poor efficiency. Suppose you have an embedded system running off USB power to perform some cryptographic task, but the USB port the cable's plugged into is under the control of an attacker who has it instrumented to sample the power consumption at a high frequency. He can perform {{w|power_analysis}} if the load changes based on the operations performed by your device, but the setup in the comic should prevent information from leaking upstream in this manner. [[User:D5xtgr|D5xtgr]] ([[User talk:D5xtgr|talk]]) 19:44, 29 July 2022 (UTC) |