by Chris Black
There are viruses smaller than 7KB and many clever ways to use specific bit sequences to cause arbitrary code execution. If a QR code can prompt you to open an image or a website it can give your computer AIDS.
Even something more low-level like the alphabet boys are sitting on multiple zero-day exploits for QR codes that cause arbitrary code execution.
I have never scanned a QR code in my life for this very reason
Generate a #QR_code #attack_vector t.co/IZRbL1jZne
— omvapt (@omvapt) May 19, 2021
Historical analogues to modern side-channel attacks are known. A recently declassified NSA document reveals that as far back as 1943, an engineer with Bell telephone observed decipherable spikes on an oscilloscope associated with the decrypted output of a certain encrypting teletype.
Newest Intel Side-Channel Attack Sniffs Out Sensitive Data #cybersecurity #cloudcomputing #phishing #malware #Infosec#cyberthreats #ransomware #cloud #hacked #dataprotection#privacy #dataleak #riskmanagement #cyberattacks #databreacht.co/8Ik3ysuGYb pic.twitter.com/zMLeMQ5xb1
— Paula Piccard #CES2022 (@Paula_Piccard) March 9, 2021
Feds are using a neural networks to decode your keystrokes’ audio signatures. They can also reconstruct your phenotype from its outputs such as your voice.
And from there we can infer the genotype.
But all is done in some weird black-box AI way.