As JC Ewing notes, this requires pretty well complete control, including being 
able to force an operation and knowing when that happens. Just having the phone 
isn't going to do you any good. Remember that these wee devices are doing a lot 
all the time-I'd be unsurprised to learn that you also need to not have any 
other apps running. For example, my HTC 10 has 8 cores, several of which are 
doing *something* at any given instant. So this is like sniffing a single 
whispered syllable in a crowded room: you likely need to be near the person and 
get everyone else to shut up, and know when the speaker is going to utter it.

 

Like most such attacks, it's far too theoretical to worry about IMHO.

 

.phsiii

 

 


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to