As far as I understand it, you will need physical access to the machine and know what you are doing.
If someone has physical access to my machine, breaking encryption is probably not my biggest problem right now.
As far as I understand it, you will need physical access to the machine and know what you are doing.
If someone has physical access to my machine, breaking encryption is probably not my biggest problem right now.
No 😢 the article suggests any code running in user mode can attempt, sounds like indirect access to memory via cache, so just a matter of waiting and watching for long enough to collect what you need. If a browser running js can trigger it …. sounds pretty bad/deliberate regardless
#notyourkeys