Anonymous 10/08/2019 (Tue) 13:14:02 No.12125 del
(69.64 KB 396x291 1510360485852.jpg)
The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.

https://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdf