Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
hobls
on Aug 23, 2018
|
parent
|
context
|
favorite
| on:
Single-decryption EM-based attack reveals private ...
I’m curious how reliably you could distinguish the act of exponentiaton from other activity if the phone was just sitting on a table. (Or if it was being actively used, but you weren’t able to see what was happening.)
nielsbot
on Aug 23, 2018
[–]
Any possibility of picking out the pattern of exponentiation activity from a long recording of the device working? ML?
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: