1 Matching Annotations
  1. Last 7 days
    1. Chcesz zostać hakerem? Przyda ci się butelka.
      • The Concept: Researchers from Hong Kong demonstrated a "side-channel" attack that uses standard fiber optic cables as microphones to eavesdrop on conversations [00:00:25].
      • How It Works (Rayleigh Scattering): When sound waves (vibrations) hit a fiber optic cable, they cause micro-deformations in the glass. This affects the light traveling through the fiber, causing phase shifts and reflections back to the source—a phenomenon known as Rayleigh Scattering [00:01:44].
      • The "Bottle" Amplifier: While standard cables in a wall can pick up some sound, the effect is weak. To amplify the signal, attackers can wrap a long section of fiber around a hollow object, like a plastic bottle. This creates a "coil" that acts as a highly sensitive acoustic sensor [00:04:54].
      • Attack Requirements:
        • Physical Access: The attacker needs access to one end of the fiber (e.g., in a server room) to connect a Distributed Acoustic Sensing (DAS) analyzer [00:03:23].
        • Preparation: The target's end of the cable must be "prepared" (e.g., by a fake technician) with the fiber coil/amplifier to get clear audio [00:04:34].
      • Performance and Results:
        • Accuracy: At a distance of 2 meters from the fiber coil, researchers achieved up to 80% accuracy in reconstructing speech [00:07:26].
        • Range: Sound can still be somewhat understood at distances up to 8 meters, though quality drops significantly [00:07:44].
        • Immunity: Unlike electronic microphones, fiber optic "microphones" are completely immune to ultrasonic jammers [00:08:43].
      • Practicality: The video concludes that this is not a threat to the average person due to the extreme complexity and access required. However, it is a fascinating example of how physical properties can be exploited for espionage in high-security environments [00:10:22].