From 3dc04b1da885e26e3eb84e0b123f6b027c0da4a8 Mon Sep 17 00:00:00 2001 From: deathrow Date: Tue, 14 Feb 2023 11:24:00 -0500 Subject: [PATCH] Power Analysis Section --- _items/Guide.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/_items/Guide.md b/_items/Guide.md index 868caa8..042d5aa 100644 --- a/_items/Guide.md +++ b/_items/Guide.md @@ -98,6 +98,7 @@ _Disclaimer: This is for education / research._ -\>> [Plausible Deniability](#plausible-deniability)
-\>> [Tails](#tails)
-\>> [Anonymous Server](#anonymous-server)
+-\>> [Power Analysis](#power-analysis)
-\>> [TLDR](#tldr)
--- @@ -1551,6 +1552,23 @@ For the actual server, you can use [1984](https://1984.is/) or the listed option --- +### **Power Analysis** + +*"Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated."* + +
+ +This is an advanced attack which requires equipment and the technical skill to sucessfully operate such an attack. + +Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)). + +To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use. +It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's. + +
+ +--- + ## TLDR Don't use the internet.