Feeds

Teapot backdoor probed by German telescope boffins

Spoons, spectacles, even eyeballs - all security risks

The Power of One eBook: Top reasons to choose HP BladeSystem

Just when you (may have) thought it was safe to log back onto your computer and do something private, German security boffins have come up with a new vulnerability.

Being a security-aware type of person - and perhaps preferring a view - your monitor doubtless faces away from the window, meaning that evilly-inclined persons with telescopes can't see what you're up to. Right? Wrong. Well, wrong if there's a teapot (or indeed any other reflective object) on or near your desk, anyway.

Michael Backes, Markus Durmuth and Dominique Unruh of Saarland University and the Max Planck Institute for Software Systems in Saarbrucken have found that hats of an opposing colour can train their telescope through the window on the adjacent reflective object, and so read everything taking place on your screen. Spherical surfaces (like the typical teapot) are especially good, because of the wide field of view they offer.

The Teutonic brainboxes' paper is called Compromising Reflections, or How to Read LCD Monitors Around the Corner, and can be read in pdf here. In it, the trio say that they were able to read 12-point Word documents off a nearby reflector from ten metres distance using a $1500 telescope. Upgrading to a more expensive $27,500 job, they could pick the info off reflectors from 30m away, as though across a street.

Apart from tea fanciers, the other big security leaks are spectacle-wearers - though it's at least marginally possible to read info directly off a user's eyeballs, apparently.

Particularly good results were obtained from reflections in a user’s eyeglasses or a tea pot located on the desk next to the screen. Reflections that stem from the eye of the user also provide good results. However, eyes are harder to spy on at a distance because they are fast-moving objects and require high exposure times ... glasses constitute an ideal target for our attack due to their less extreme curvature.

Other possible reflectors included wine glasses, plastic coke bottles and a spoon lying next to the monitor.

Don't think you're safe if you clear all the reflecting objects off your desk, either. Backes, Durmuth and Unruh are now working on reading "diffuse reflections on the user’s clothes or on a nearby wall". ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.