- Apr 27, 2000
- 23,204
- 13,289
- 136
Forbes article
Original article (abstract is linked, .pdf is freely available)
Hmm! Interesting. I don't know of any circumstances where this precise attack vector is in use "in the wild", but similar side-channel h4x0ring has been done in the past to steal Bitcoins and do other fun things.
Original article (abstract is linked, .pdf is freely available)
Hmm! Interesting. I don't know of any circumstances where this precise attack vector is in use "in the wild", but similar side-channel h4x0ring has been done in the past to steal Bitcoins and do other fun things.
