Power Analysis Section

This commit is contained in:
deathrow 2023-02-14 11:24:00 -05:00
parent 5ae1b5e0d8
commit 3dc04b1da8
No known key found for this signature in database
GPG Key ID: FF39D67A22069F73

View File

@ -98,6 +98,7 @@ _Disclaimer: This is for education / research._
-\>> [Plausible Deniability](#plausible-deniability) <br> -\>> [Plausible Deniability](#plausible-deniability) <br>
-\>> [Tails](#tails) <br> -\>> [Tails](#tails) <br>
-\>> [Anonymous Server](#anonymous-server) <br> -\>> [Anonymous Server](#anonymous-server) <br>
-\>> [Power Analysis](#power-analysis) <br>
-\>> [TLDR](#tldr) <br> -\>> [TLDR](#tldr) <br>
--- ---
@ -1551,6 +1552,23 @@ For the actual server, you can use [1984](https://1984.is/) or the listed option
--- ---
### **Power Analysis**
*"Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated."*
<br>
This is an advanced attack which requires equipment and the technical skill to sucessfully operate such an attack.
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use.
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
<br>
---
## TLDR ## TLDR
Don't use the internet. Don't use the internet.