Looks like we'll all have to switch to tablet PCs

  • Thread starter Thread starter jtbell
  • Start date Start date
  • Tags Tags
    Switch
AI Thread Summary
Keyboard sniffers, which can capture keystrokes through electromagnetic emissions, have been a concern for data security for years. Recent discussions highlight that while it is theoretically possible to detect individual keystrokes, practical limitations exist due to interference from other electronic devices. Tests have shown that capturing keystrokes effectively requires isolating the keyboard from other powered devices. The phenomenon is linked to historical concerns about electromagnetic emissions, such as those addressed by the TEMPEST program, which aimed to protect sensitive data from electronic eavesdropping. Current keyboard designs often use high-impedance contacts that emit weak signals, making them difficult to analyze without sophisticated methods. Additionally, shielding technologies, like those used in military-grade monitors and secure buildings, are already in place to mitigate these risks. Overall, while the potential for keyboard sniffing exists, effective countermeasures and practical challenges limit its feasibility.
jtbell
Staff Emeritus
Science Advisor
Homework Helper
Messages
16,023
Reaction score
7,542
Computer science news on Phys.org
Not mine, all my keys have little tinfoil hats.
 
Hmm, my new Mac's keyboard has an aluminum body. Maybe that will help!
 
This is only possible if you are typing the individual keystrokes REALLY slowly.

I've seen it in action, Also the tests were done with just a single keyboard powered by a shut (unplugged) laptop to avoid interference. Basically a battery.

Combine a Keyboard, Mouse, Monitor, Power source and any other electrical device in your system and the noise/interference makes it pretty much impossible to detect individual keystrokes. (for now)
 
A worry for quite a long time! People at the encrypted transmission service told me about that as I visited an embassy in 1975 or 1976. I didn't hear "Tempest" then, but they knew the weakness and tried to protect their data against it.

Which doesn't mean that the radiation could already be analysed then - only that they felt useful to take the possibility into account.

As for the Swiss experiment: most keyboards use contacts with high impedance, either because the contacts themselves are made by carbon-filled elastomers or because load resistors a big to reduce consumption, so I bet the contacts radiate very small (and indistinct!) fields, and the researchers picked data from the USB transmission instead, where keys are already encoded. The cable itself is more or less shielded, but the connectors not so much, and the electronics at both ends even less.

So put your aluminium foil rather there...

As for interferences, many of them can (and must!) be removed before analysing the leak by a keyboard. Though if your screen is a cathode ray tube, the attacker won't waste his time at the keyboard.
 
20 metres? Isn't there a dampening system for these emissions?
 
OAQfirst said:
20 metres? Isn't there a dampening system for these emissions?

Sure there is. Back when CRT monitors where more common you could buy military spec monitors that were shielded to prevent anyone from picking up the signal from them using an antenna (which turns out to be quite easy and can be done at a large distance). I would be suprissed if there aren't shielded keyboard as well.

Electronic surviellance has been around for a long time and most high-security building should already already have some protection in place (metal films on the wall, windows with conducting films etc to create a Faraday's cage and so on).
So I don't think this is anything new.
 
Back
Top