Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Oh yes you do.

"14 Popular Air-Gapped Data Exfiltration Techniques Used to Steal the Data" - https://thesecmaster.com/14-popular-air-gapped-data-exfiltra...

"A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges" - https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10054827/



The data could be public anyway, like publicly funded research data. Not every number crunching means secrecy.

Also none of the above are about software level security.

You'll probably not doing those anyway, even if you have all the security fixes for cpu timing stuff (as was the context) enabled.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: