Through Glass Transfer (TGXf)

(202 views)

  The TGXf application demonstrates that:  • Any file that a user can read (use) can be downloaded (disclosure) via the screen, and;  • There are currently no technical controls to mitigate the proof-of-concept implementation.  Although technical vulnerability is constantly evolving (the proof-of-concept is defeatable), there is no foreseeable mitigation to the class of vulnerability described (storage based covert channels) and the general approach taken. This has the most impact when considering domestic enterprises that provide off-shore (overseas) partners with access to domestic data and processing infrastructure on-shore.In technical terms, TGXf encodes binary data into packets that can be displayed on the screen of one computer and then captured (via camera) on another, where they are decoded and the data is stored on disk. By doing this, TGXf turns any display surface into a binary data transfer interface and bypasses enterprise security strategies (including defence-in-depth strategies).  You can see a TGXf transfer in action here;    Android smart-phone in flight mode,....

November 7, 2014
Subscribe
Notify of
guest
3 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
6 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

joblow
joblow
9 years ago

How well would SSTV work with this?.

brutelogic
9 years ago

Awesome!

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.