Bibliography (21):

  1. https://www.nassiben.com/video-based-crypta

  2. https://arstechnica.com/information-technology/2023/06/hackers-can-steal-cryptographic-keys-by-video-recording-connected-power-leds-60-feet-away/

  3. https://www.logitech.com/en-us/products.html

  4. Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED

  5. Hearing your touch: A new acoustic side channel on smartphones

  6. EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers

  7. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations

  8. Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

  9. How to See the World’s Reflection From a Bag of Chips: Computer scientists reconstructed the image of a whole room using the reflection from a snack package. It’s useful for AR/VR research—and possibly spying

  10. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86

  11. ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards

  12. Deep-Spying: Spying using Smartwatch and Deep Learning

  13. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone