1997-03-12 - TEMPEST protection

Header Data

From: ichudov@algebra.com (Igor Chudov @ home)
To: cypherpunks@algebra.com
Message Hash: 9e1819e66d4becacadca0bc2453948a5cee0311f93953245243fc642ea16d9e3
Message ID: <199703120604.AAA00512@manifold.algebra.com>
Reply To: N/A
UTC Datetime: 1997-03-12 06:07:58 UTC
Raw Date: Tue, 11 Mar 1997 22:07:58 -0800 (PST)

Raw message

From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 11 Mar 1997 22:07:58 -0800 (PST)
To: cypherpunks@algebra.com
Subject: TEMPEST protection
Message-ID: <199703120604.AAA00512@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Ladies and Gentlemen,

I would like to find out how hard (and expensive) would it be
to try to protect my computer by TEMPEST-like measures.

I am not an electrical engineer and am looking (hopefully) for
a relatively easy to understand do-it-yourself type of manual.

I have heard from my acquaintaince who is a tempest professional that 
it was not very possible. If that is indeed true, are there any
measures that can be taken to at least complicate spying on my computer?

Not that I think that Martians from the flying saucers are already
listening, but it is interesting to find out how to do this stuff.

Thank you very much.

	- Igor.





Thread