
Highlights: #195 – Sella Nevo on who's trying to steal frontier AI models, and what they could do with them
80k After Hours
00:00
Exploring Vulnerabilities in Encryption and the Dangers of Side-Channel Attacks
This chapter explores the weaknesses of encryption systems, focusing on how side-channel attacks take advantage of physical characteristics to extract sensitive information. It highlights specific examples, like the power fluctuations in RSA encryption and the risks posed by easily abandoned USB drives, showcasing how simple strategies can threaten secure networks.
Transcript
Play full episode