
Thunderbird Acquired K9 Mail! - SR92
Surveillance Report
00:00
A New Way of Executing Cryptographic Keys Using Side Channels
A new vulnerability in intel and a m d c p us that lets attackers steal inscription keys. Blue tooth signals can be used to track smart phones. Your browser stores passwords and sensitive data in clear text in memory.
Transcript
Play full episode