1. 11
  1.  

  2. 2

    This may be novel and certainly takes it to the next level, but creating intentional leaks that can be monitored by e.g. Van Eck phreaking is an old technique. Saw another exciting one at Defcon recently: A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors with a quick writeup: Hackers Could Break Into Your Monitor To Spy on You and Manipulate Your Pixels. Also oldschool and going strong, TEMPEST attacks like this one released in July: Experts Recover AES256 Encryption Key From a PC’s Electromagnetic Emissions. Of course, none of these can escape data from a faraday-caged computer – that’s a whole new level!

    1. 3

      but creating intentional leaks that can be monitored by e.g. Van Eck phreaking is an old technique.

      Far as older stuff, here’s a document that NSA declassified showing Bell’s discovery and the problems trying to mitigate it caused. The three techniques in the paper are still the basic measures today. Trying to implement them has just gotten to be a bigger pain if mitigating every potential leak.