Blog
Compromising Emanations
Tue, 09/15/2015
Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.