As JC Ewing notes, this requires pretty well complete control, including being able to force an operation and knowing when that happens. Just having the phone isn't going to do you any good. Remember that these wee devices are doing a lot all the time-I'd be unsurprised to learn that you also need to not have any other apps running. For example, my HTC 10 has 8 cores, several of which are doing *something* at any given instant. So this is like sniffing a single whispered syllable in a crowded room: you likely need to be near the person and get everyone else to shut up, and know when the speaker is going to utter it.
Like most such attacks, it's far too theoretical to worry about IMHO. .phsiii ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN