Compare commits

...

4 Commits

Author SHA1 Message Date
deathrow
3dc04b1da8
Power Analysis Section 2023-02-14 11:24:00 -05:00
deathrow
5ae1b5e0d8
Update Format 2023-02-14 11:11:53 -05:00
deathrow
a98c721e80
Various wording 2023-02-14 11:04:24 -05:00
deathrow
16f24fe23d
Add Hackliberty 2023-02-14 11:04:10 -05:00
3 changed files with 26 additions and 5 deletions

View File

@ -67,6 +67,8 @@ Articles and stories related to technology, security or privacy
A place for related various communities & media
- [Hackliberty](https://hackliberty.org)<button type="button" class="btn btn-default btn-xs"><a href="http://xj2i2lkzecitg6cq5ca3vrhlzq4evgz6qr2i4s7b4y57ktuaohff4vyd.onion">Tor</a></button>
- [PrivacyGuides](https://privacyguides.org) <button type="button" class="btn btn-default btn-xs"><a href="http://eter4u55b667kuo72ntpm7ut54sa2mxmr22iqgzns4jw7boeox3qgyid.onion">Tor</a></button>
- [Privsec](https://privsec.dev)

View File

@ -98,6 +98,7 @@ _Disclaimer: This is for education / research._
-\>> [Plausible Deniability](#plausible-deniability) <br>
-\>> [Tails](#tails) <br>
-\>> [Anonymous Server](#anonymous-server) <br>
-\>> [Power Analysis](#power-analysis) <br>
-\>> [TLDR](#tldr) <br>
---
@ -1204,6 +1205,7 @@ Often times, these devices to not receive proper security patches or even update
With the rise in IOT devices, comes "smart" enabled technology.
This is often times being implemented into newer vehicles.
Unfortunately, with the rapid adoption of technology, cars are vulnerable to various types of attacks.
With more detailed information being logged by your vehicle, often times in the event of an accident of some sort, insurance companies will pull information from the vehicle such as speed and location.
<br>
@ -1550,6 +1552,23 @@ For the actual server, you can use [1984](https://1984.is/) or the listed option
---
### **Power Analysis**
*"Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated."*
<br>
This is an advanced attack which requires equipment and the technical skill to sucessfully operate such an attack.
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use.
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
<br>
---
## TLDR
Don't use the internet.

View File

@ -97,15 +97,15 @@ Recent blog posts from our [blog](./blog) page
Information from [collections](./collections)
[Information](./information) - A collection of links, articles and more.
- [Information](./information) - A collection of links, articles and more.
[GrapheneOS](./graphene)
- [GrapheneOS](./graphene)
[F-Droid](./f-droid)
- [F-Droid](./f-droid)
[Matrix](./matrix)
- [Matrix](./matrix)
[Qubes OS](./qubes)
- [Qubes OS](./qubes)
<br>
<br>