From: Ben <samman@CS.YALE.EDU>
To: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Message Hash: 02a6edc9dc3e364335b892eb13548f045148b7c15c3836155f832956371ee70a
Message ID: <Pine.3.07.9412091616.D4374-9100000@jaguar.zoo.cs.yale.edu>
Reply To: <94Dec9.095259edt.3818@cannon.ecf.toronto.edu>
UTC Datetime: 1994-12-09 21:02:07 UTC
Raw Date: Fri, 9 Dec 94 13:02:07 PST
From: Ben <samman@CS.YALE.EDU>
Date: Fri, 9 Dec 94 13:02:07 PST
To: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
Subject: Re: Secure DAC?
In-Reply-To: <94Dec9.095259edt.3818@cannon.ecf.toronto.edu>
Message-ID: <Pine.3.07.9412091616.D4374-9100000@jaguar.zoo.cs.yale.edu>
MIME-Version: 1.0
Content-Type: text/plain
> I fail to see how this would increase cryptographic potential. However,
> it would seem to mask the device's EMR. The application notes state that
> it is useful in CRT display drivers, audio encoders, &c. These are all
> devices that are succeptable to TEMPEST monitoring (or whatever the
> correct name is). If one output goes to the desired next stage (the
The spooky term for it is MASINT-Measurement and Signals INT.
Ben.
Return to December 1994
Return to “SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>”