maybe more genius than crazy but still pretty cool.Why is it crazy? How else would the PC know what to do after a key has been pressed?
In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds.
[If the laptop is unplugged], attackers point a cheap laser, slightly better than what is used in laser pointers, at a shiny part of a laptop or even an object on the table with the laptop. A receiver is aligned to capture the reflected light beam and the modulations that are caused by the vibrations resulting from striking the keys.
I think he was referencing the power from the wall to the PC, which sounds a little extreme and possibly a cover for something else.Why is it crazy? How else would the PC know what to do after a key has been pressed?
Why is it crazy? How else would the PC know what to do after a key has been pressed?
Read this this morning, very sad story. She was absolutely stunning as well, what a crazy husband.
It would have been a better story if the police had went round to the house and asked the Alexa thing who did it.
bitcoin isn't really anonymous anymore governments took that way.Bitcoin transactions have been traced recently. It all depends how much of a target you are to law enforcement.
"Alexa, who committed the murder?"
"Bing! I'm not telling you nuffink pig"
Criminals will soon wise up to it, immediately take any smart watches off your murdered victims and don't carry around any smart phones during the time you're claiming to be tied up. [..]
There's supposed to be a way to tell tell whats being typed on a keyboard just from the power signal leading to a pc also which is kinda crazy.
but I guess you can make a computer network through the power sockets in your home to so seems more plausible.
pretty sure thats not how the key logging works though
Leaving behind or turning off yourtrackersmartphone has already been treated as evidence of guilt. It's not yet considered proof of guilt by itself, but it is considered evidence of guilt.
It would have been a better story if the police had went round to the house and asked the Alexa thing who did it.
even if your GPS is off they can track your phone location pretty well with cell towers
yea but the point was they don't need to actually access your computer to read the keyinputs... maybe I just explained it poorly I thought people would assume "power going to pc" is power from the wall not from the cord of the keyboard...You never got keylogged in world of Warcraft? That was 15 years ago! I am sure it is more advanced now.
In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds.
[If the laptop is unplugged], attackers point a cheap laser, slightly better than what is used in laser pointers, at a shiny part of a laptop or even an object on the table with the laptop. A receiver is aligned to capture the reflected light beam and the modulations that are caused by the vibrations resulting from striking the keys.
I'm assume she was going to leave him, his manhood couldn't handle such a "betrayal" and the thought of another man maybe raising his child as the live in dad was too much.What's the motive, or generally the motive in cases like these?
Got a great job.
Got a hot young wife.
Got a loving family.
Got a nice house in a nice area.
Yup, time for me to do some the ol' murderin!