this post was submitted on 24 May 2026
286 points (99.3% liked)

PC Gaming

14719 readers
719 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments, within reason.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] cardfire@sh.itjust.works 2 points 3 hours ago (1 children)

Thanks for the in-depth response, I learned a little bit from you. :)

I'm reminded of the old black hat proof of concepts about reading bits of data via network adapter LEDs, or about listening to sound cards in other rooms doing their signal processing.

I low key kind of love the idea of an evil exfiltration scheme to use a local sound card to receive information about memory contents and then try to pass it somehow desperately over the internet, only now to be thwarted by a mute button. 🤣

[–] Dran_Arcana@lemmy.world 1 points 34 minutes ago

Those types of attacks are called "side-channel" attacks. If you wanted to look up stories of more. Fascinating history there.