Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Almost certainly either:

a) Complete BS, or

b) Not what it sounds like, but

it's not possible to figure out which from this article, which provides no information. If anyone has a link to a better explanation, I'd love to read it.

The closest thing to a clue is this vague statement:

The intruder simply hooks into what the receiver is receiving (which is actually very complex).

which sounds to me like the intruder is, in essence, looking over the receiver's shoulder.



Aha, I found the paper:

http://arxiv.org/abs/0809.3408

It's all about exploiting vulnerabilities in the type of single-photon detectors that are used in real systems. Looks like pretty clever stuff.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: