Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This explains how malware might get information out of an air-gapped computer, but how do you infect the machine in the first place? That would seem to be the harder problem.


If it communicates electronically, you could extract encryption keys and hijack communications.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: