Copyscape

Protected by Copyscape Duplicate Content Checker

IMPORTANT GENERAL MESSAGE TO ALL

PLEASE SUPPORT ME IN MY CONTINUED ADVANCE IN LOGIC STUDIES FOR THE PROGRESS OF HUMANITY BUT NOT FOR CONTROVERSY !
******** WORLD OF "Normal" HUMANS, PLEASE LIVE YOUR LIVES AS YOU DO, AND YOUR RELIGIONS AND ACADEMIA, ETC ! I WILL LIVE MY more normal free LIFE IN "COMPLETE PEACE" WITH MYSELF AND THE MAXIMUM LOGIC OF "PURE LOGIC" ! - MANY THANKS TO ALL !
PURE LOGIC IS HOW TO ANALYZE AND IF IT IS WRONG OR RIGHT UNDER MOST SCENARIOS AND WHY, NOT IF ACADEMIA OR HUMANS ARE GOING TO EMPLOY IT...!

Maximum limit of CO2 350ppm...!

CO2 World Ocean Acidification...!

##
World CO2
since 1750 (cubic feet)

zFacts.com - CO2 Global Warming

UNIVERSAL STANDARD TIME - UTC - GMT [Greenwich-UK ! ] - Date Line Pacific FIJI



7 TIMES - do they do for you ? - 7 HORAS = LE SIRVE ALGUNO ?

COUNTDOWN TO WORLD "OVER-POPULATION" OF 7 BILLION

WORLD POPULATION CLOCK USA GOV

PoodWaddle World Population and Productive Land Count !

YOUR CUTE unforgettable games online

YOUR CUTE unforgettable games online http://tetris-it.blogspot.com

Other web addresses


Other Web sites:


JOINTQUEST.COM ; GeorgeFrederickThomsonBroadhead.com ; DatJot.com
http://twitter.com/CoolerDrink
https://Facebook.com : Pure Logic Book
https://Facebook.com : George Frederick Thomson Broadhead
http://thepurelogic.wordpress.com
http://www.youtube.com/user/BookOfPureLogic
http://en.wikipedia.org/wiki/User:Forever_true
http://en.metapedia.or/wiki/User_talk:George1963#Articles
http://www.collectionscanada.gc.ca/newbooks/07/g4-100e.html
DO NOT FORGET THE RECENT BUT FORGOTTEN "LINK":
http://www.DatJot.com

Blog of Venezuela - A country gone to another reality ! AND eve-nt !

DO NOT MISS the "Modern" Efforts of a ancient violent dead God and Jesus !

http://www.y-jesus.com
----------------------------------------------------
http://www.godresources.org/index.php?p=home

Sunday, August 15, 2010

...you all have lost your privacy under the world electronic dictatorship conspiracy...!


http://lasecwww.epfl.ch/keyboard/

COMPROMISING ELECTROMAGNETIC EMANATIONS OF WIRED AND WIRELESS KEYBOARDS
Martin Vuagnoux and Sylvain Pasini
Computer keyboards are often used to transmit sensitive information such as username/password (e.g. to log into computers, to do e-banking money transfer, etc.). A vulnerability on these devices will definitely kill the security of any computer or ATM.
Wired and wireless keyboards emit electromagnetic waves, because they contain electronic components. These electromagnetic radiation could reveal sensitive information such as keystrokes. Although Kuhn already tagged keyboards as risky, we did not find any experiment or evidence proving or refuting the practical feasibility to remotely eavesdrop keystrokes, especially on modern keyboards.
To determine if wired and wireless keyboards generate compromising emanations, we measured the electromagnetic radiations emitted when keys are pressed. To analyze compromising radiations, we generally use a receiver tuned on a specific frequency. However, this method may not be optimal: the signal does not contain the maximal entropy since a significant amount of information is lost.
Our approach was to acquire the signal directly from the antenna and to work on the whole captured electromagnetic spectrum.
We found 4 different ways (including the Kuhn attack) to fully or partially recover keystrokes from wired keyboards at a distance up to 20 meters, even through walls. We tested 12 different wired and wireless keyboard models bought between 2001 and 2008 (PS/2, USB and laptop). They are all vulnerable to at least one of our 4 attacks.
We conclude that wired and wireless computer keyboards sold in the stores generate compromising emanations (mainly because of the cost pressures in the design). Hence they are not safe to transmit sensitive information. No doubt that our attacks can be significantly improved, since we used relatively inexpensive equipments.
UPDATE: This paper has been published in 18th USENIX Security Symposium 2009 in August 2009. You can download it here or here (local version) . This paper received the Outstanding Student Paper Award!

Frequently Asked Questions
Q: Why you disconnect the power supply of the laptop?
A: At the beginning of our experiments, we obtained very good results. We were able to capture the signal at an impressive distance. We discovered that the shared ground may acts as an antenna and significantly improve the range of the attack. To avoid any physical support for compromising emanations, we disconnected every cable connected to the computer. Thus, the objective of this demo is to confirm that compromising emanations are not carried by the power supply wire.

Q: The keyboard is connected to a laptop. Is it still working if the keyboard is connected to a usual computer (i.e. PC tower) ?
A: Yes, our attacks are still working (and are generally better on PC tower). Since a desktop computer (PC tower) has no battery, it must be connected to the electrical network. Thus, we cannot avoid the shared ground effect (see the previous question).

Q: Why you remove the LCD display? Is it because the LCD generates too much noise?
A: We remove the LCD display because it can emit compromising signals (see this paper) and could carry keyboard emanations. To avoid any support for compromising emanations we disconnected the LCD display. The noise generated by the LCD display is insignificant since it can be easily filtered. Moreover, in the first video, you can see two powered LCD displays in the same room during the measurements. They do not disrupt the experiment.

Q: You are typing so slowly! Why?
A: The filtering and decoding processes take time (about two seconds per pressed key). To make sure that we captured all keystrokes we typed very slowly. With hardware-based computation (i.e. FPGA) the filtering and decoding processes can obviously be instantaneous (e.g. less than the minimum time between two keystrokes), it's just a matter of money.

Q: I found something odd. Your tool seems to capture 12 or 8 characters (depending on the video) and then decode them. How do you know that you will have exactly 12 (or 8) keys to recover?
A: If you look carefully at the videos the filtering and decoding processes take more time than the capturing process. To not spend 2 seconds between each keystroke, we first capture a fixed number of keys and then we recover the keystrokes. With some dedicated hardware-based FFT computation, we can avoid this time (see previous question). Thus, we fixed the number of character for the demo, but we can use an infinite scanning loop as well.

Q: If there is more than one keyboard in the same room, are you able to distinguish them and to recover all keystrokes?
A: Yes, each keyboard can be distinguished even if they comes from the same manufacturer and share the same model (more information in our paper).

Q: Are wireless keyboards vulnerable as well?
A: Yes, they are :-)

2007-2009 Security and Cryptography Laboratory - LASEC/EPFL

............................................................

north america - australia - europe

...you have been stripped of your acquired privacy rights since the common mechanical typewriter.
this is a world conspiracy of intel, amd, electronic boards builders, and microsoft with software developers.
we may as well all go around in the legal "nudity"...!
we are under and electronic "dictatorship...!
you have lost all your pirvacy through any computer...!
your passwords, everything escapes to emi "electromagnetic radiation receivers...!
and you could have also "backdoors" through software or hardware from the builders also...!
YOU ARE ALL MORE STUPID THAN EVER...!
THIS IS GOING TO BLOW UP IN THEIR FACES WORSE THAN A WORLD CONFLAGRATION...!

I HOPE USA AND world INDUSTRIES LOOSE ALL THEIR CREATIVE WORK...!