Editing Talk:2651: Air Gap

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 33: Line 33:
 
::: Maybe this helps? https://ieeexplore.ieee.org/abstract/document/5625426 [[Special:Contributions/172.70.142.21|172.70.142.21]] 06:51, 29 July 2022 (UTC)
 
::: Maybe this helps? https://ieeexplore.ieee.org/abstract/document/5625426 [[Special:Contributions/172.70.142.21|172.70.142.21]] 06:51, 29 July 2022 (UTC)
 
:::: Yes! [https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=1961&context=all_theses Figure 1.10 seems to suggest that frequencies above 10 Hz are filtered,] and that seems consistent with Figure 3.14, in that recovery time is a tenth of a second (though drop-off "cooldown" time is much shorter.) So if I remember my {{w|Binary Golay code|modem math,}} even with the most sophisticated coding, anything more than 640 bits per second should be impossible. [[Special:Contributions/172.69.33.225|172.69.33.225]] 07:39, 29 July 2022 (UTC)
 
:::: Yes! [https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=1961&context=all_theses Figure 1.10 seems to suggest that frequencies above 10 Hz are filtered,] and that seems consistent with Figure 3.14, in that recovery time is a tenth of a second (though drop-off "cooldown" time is much shorter.) So if I remember my {{w|Binary Golay code|modem math,}} even with the most sophisticated coding, anything more than 640 bits per second should be impossible. [[Special:Contributions/172.69.33.225|172.69.33.225]] 07:39, 29 July 2022 (UTC)
βˆ’
::::: 640 bits per second should be enough for anyone. But seriously, Fig. 1.10 shows a fall-off, not a sharp peak. How do you know there isn't an 8,192-dimensional analog to the {{w|Leech lattice}} which would allow kbps? [[Special:Contributions/172.69.33.199|172.69.33.199]] 22:56, 29 July 2022 (UTC)
 
  
 
I'm almost tempted to suggest that this should be an (honourary) addition to the Cursed Connectors comic-collection. [[Special:Contributions/172.71.94.187|172.71.94.187]] 14:56, 28 July 2022 (UTC)
 
I'm almost tempted to suggest that this should be an (honourary) addition to the Cursed Connectors comic-collection. [[Special:Contributions/172.71.94.187|172.71.94.187]] 14:56, 28 July 2022 (UTC)
Line 57: Line 56:
 
There are actually usecases for optical power links. For example electric field probes use this: https://www.raditeq.com/products/electric-field-probes/
 
There are actually usecases for optical power links. For example electric field probes use this: https://www.raditeq.com/products/electric-field-probes/
 
--[[User:Casandro|Casandro]] ([[User talk:Casandro|talk]]) 08:10, 29 July 2022 (UTC)
 
--[[User:Casandro|Casandro]] ([[User talk:Casandro|talk]]) 08:10, 29 July 2022 (UTC)
βˆ’
:Some drones can be recharged in the air by lasers, but that's a really obscure application only the military needs, and then only as a contingency backup in most cases, but there were flying demos by companies interested in the space over the past decade. [[Special:Contributions/172.70.211.88|172.70.211.88]] 22:09, 29 July 2022 (UTC)
+
::Some drones can be recharged in the air by lasers, but that's a really obscure application only the military needs, and then only as a contingency backup in most cases, but there were flying demos by companies interested in the space over the past decade. [[Special:Contributions/172.70.211.88|172.70.211.88]] 22:09, 29 July 2022 (UTC)
  
 
I think it might be possible to construct a scenario where this could have some security benefit, albeit not one that justifies such poor efficiency. Suppose you have an embedded system running off USB power to perform some cryptographic task, but the USB port the cable's plugged into is under the control of an attacker who has it instrumented to sample the power consumption at a high frequency. He can perform {{w|power_analysis}} if the load changes based on the operations performed by your device, but the setup in the comic should prevent information from leaking upstream in this manner. [[User:D5xtgr|D5xtgr]] ([[User talk:D5xtgr|talk]]) 19:44, 29 July 2022 (UTC)
 
I think it might be possible to construct a scenario where this could have some security benefit, albeit not one that justifies such poor efficiency. Suppose you have an embedded system running off USB power to perform some cryptographic task, but the USB port the cable's plugged into is under the control of an attacker who has it instrumented to sample the power consumption at a high frequency. He can perform {{w|power_analysis}} if the load changes based on the operations performed by your device, but the setup in the comic should prevent information from leaking upstream in this manner. [[User:D5xtgr|D5xtgr]] ([[User talk:D5xtgr|talk]]) 19:44, 29 July 2022 (UTC)

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)

Template used on this page: