{"id":2334,"date":"2016-12-02T13:00:27","date_gmt":"2016-12-02T12:00:27","guid":{"rendered":"http:\/\/e3mag.com\/?p=2334"},"modified":"2022-05-01T08:12:25","modified_gmt":"2022-05-01T06:12:25","slug":"future-love-yesterday","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/zukunft-lief-doch-gestern-schon\/","title":{"rendered":"Digital X-ray view"},"content":{"rendered":"<p>Today's EWLAN<span id=\"urn:local-text-annotation-v56d7fod8wn02l27yxxjpdcedm6ntx45\" class=\"textannotation disambiguated wl-thing\">Infrastructures<\/span> operate at 2.4 and 5 GHz - a frequency range in which water interacts with electromagnetic waves.<\/p>\n<p>Anyone with an old microwave oven, which after switching on the <span id=\"urn:local-text-annotation-88b85kjzkle1xscoum7sg9t1wjcccoyq\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-The people who have problems with reception can tell you a thing or two about it.<\/p><div id=\"great-525759992\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>But how does something like this become a security problem? Through the clever, but hardly imaginable use of applications. But one after the other...<\/p>\n<p>The human body consists of more than 50 percent water. We humans also interact with the <span id=\"urn:local-text-annotation-phi2qz2kg11cvzq11k0n6cf7z5oikisk\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>.<\/p>\n<p>These \"disturbances\" are nowhere near as massive as with old microwaves, but they are measurable!<\/p>\n<p>If one combines the information of several <span id=\"urn:local-text-annotation-xjxbrdpxpumnw0k1ttm6zh91b096og3e\" class=\"textannotation disambiguated wl-thing\">Antennas<\/span>The railgun in the Schwarzenegger film Eraser is not so far-fetched. So the \"railgun\" in the Schwarzenegger film \"Eraser\" is not so far-fetched.<\/p>\n<p>Recent research even allows to distinguish gestures with arm or fingers in space - just remember Tom Cruise in \"Minority Report\"!<\/p>\n<p>Scanning through walls and detecting movements in electromagnetic fields are nothing new: For example, police can use them to gain information about people taken hostage without entering the room.<\/p>\n<p>Even if the systems are more sophisticated and emit waves: The principle is the same.<\/p>\n<h2>See through walls<\/h2>\n<p>But the possibilities go much further: current research shows how to determine the PIN on a mobile device just by evaluating generally available information at a <span id=\"urn:local-text-annotation-vcf456o4ok63lcaphjzbvsolvccj47cr\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-<span id=\"urn:local-text-annotation-79isawc01dm5unyxahlby6zyng83qqke\" class=\"textannotation disambiguated wl-thing\">Router<\/span>.<\/p>\n<p>Modern variants use several <span id=\"urn:local-text-annotation-wq571qt49j4xem2u02h77mxsfottdggd\" class=\"textannotation disambiguated wl-thing\">Antennas<\/span>, the signal reception strength can be read out easily (CSI - Channel Strength Information).<\/p>\n<p>If a mobile device is connected to the <span id=\"urn:local-text-annotation-7b5y1ge8ydsmlp26nserwmdkv34rv5ie\" class=\"textannotation disambiguated wl-thing\">Router<\/span> connected, there are minimal changes in the reception strengths during (PIN) entry: due to the movement of the hand in the room where it is connected to the <span id=\"urn:local-text-annotation-kzzvlnlcgb8e4wqh6acusv51z2txdqnq\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-waves interacts, and by the minimally changed orientation of the device.<\/p>\n<p>If the changes in reception strength are correlated, there is a probability of up to 81.8 percent of recognizing a ten-digit PIN that has been entered - without any compromise of the terminal itself.<\/p>\n<p>Here, the purely academic approach of a future threat becomes a current problem!<\/p>\n<p>For a potential attacker, it is not even necessary to have a public <span id=\"urn:local-text-annotation-u3fakzfqknjopdhd96ppp96ydmo2fmii\" class=\"textannotation disambiguated wl-thing\">Hotspot<\/span> in a caf\u00e9. He simply sets a so-called rogue <span id=\"urn:local-text-annotation-xqatqs4121aytb39655womw7lmcbex0l\" class=\"textannotation disambiguated wl-thing\">Access Point<\/span> on, under an existing or a generic name (\"<span id=\"urn:local-text-annotation-ec43vko80ydnvznvqmn2pf7j5x7qq4ev\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>\", \"freeWiFi\"...).<\/p>\n<p>The process can even be automated to the point where the rogue <span id=\"urn:local-text-annotation-atl642it4pd8u6gxq42qc8xtofyx5aa9\" class=\"textannotation disambiguated wl-thing\">Access Point<\/span> automatically checks according to which <span id=\"urn:local-text-annotation-eddzdzg3dbwwz3r1a5ybht6wg8bmpr1k\" class=\"textannotation disambiguated wl-thing\">WiFi<\/span>-name devices, and also offers these names.<\/p>\n<p>This leads to devices (often without any user interaction) automatically using such networks.<\/p>\n<h2><span id=\"urn:local-text-annotation-c2tuvzjbnaixe7azc2akpadj7wmkqkv5\" class=\"textannotation disambiguated wl-thing\">Security<\/span>: always new, always exciting<\/h2>\n<p>The danger in the use of public <span id=\"urn:local-text-annotation-x59vij5bini524pmueuie5berw082ygq\" class=\"textannotation disambiguated wl-thing\">Hotspots<\/span> So it is no longer just that the <span id=\"urn:local-text-annotation-zhggqztpahebnctfa4ao7u42we6qsocc\" class=\"textannotation disambiguated wl-thing\">Communication<\/span> can be intercepted.<\/p>\n<p>Meanwhile, local inputs on the device can also be evaluated. It is therefore advisable to rely on additional mechanisms like a fingerprint, especially for critical applications.<\/p>\n<p>Such scenarios are one reason why <span id=\"urn:local-text-annotation-v085petle5er8evtskiwn88xsarafhlw\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-<span id=\"urn:local-text-annotation-i57ga839vlzzzlz790vq4wo30u3rfyk5\" class=\"textannotation disambiguated wl-thing\">Security<\/span> is so interesting and will probably remain so.<\/p>\n<p>Threats are always coming from new and sometimes completely unexpected directions - as <span id=\"urn:local-text-annotation-25sgjs9g0mrfb2gpj546rgkbhjiroe4p\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-As security managers, we must identify these risks, develop appropriate countermeasures, and implement them.<\/p>\n<p>In the specific case, confirmation of previous \"best practices\" is recommended. The access of devices to public <span id=\"urn:local-text-annotation-a6tt1zjbz6gd1kyfdmheolc0z7xcgqi6\" class=\"textannotation disambiguated wl-thing\">Hotspots<\/span> has risk potential.<\/p>\n<p>In the past, it was the possibility of <span id=\"urn:local-text-annotation-3lmyiptxcqtx5hmw0lzxcxvmsj5vp0br\" class=\"textannotation disambiguated wl-thing\">Communication<\/span> Today, there is also the additional risk that PINs and other entries can be intercepted.<\/p>\n<p>Depending on the criticality of the data, this is another scenario that should play a role in risk considerations.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/partners\/trend-micro-deutschland-gmbh\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" title=\"Digital x-ray view\" class=\"aligncenter wp-image-11382 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO.jpg\" alt=\"https:\/\/e3mag.com\/partners\/trend-micro-deutschland-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Do you know that too? You stumble across a topic, think it's science fiction - and one day you realize that the future has long since become reality...<\/p>","protected":false},"author":52,"featured_media":2451,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,740],"tags":[485,369,117,384],"coauthors":[24313],"class_list":["post-2334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag1612","tag-cyberkriminalitaet","tag-it","tag-sicherheit","tag-wlan","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Kennen Sie das auch? Sie stolpern \u00fcber ein Thema, halten es f\u00fcr Science-Fiction \u2013 und merken eines Tages, dass die Zukunft l\u00e4ngst Realit\u00e4t ist&#8230;<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1612\/\" rel=\"category tag\">MAG 16-12<\/a>","author_info_v2":{"name":"Raimund Genes, Trend Micro","url":"https:\/\/e3mag.com\/en\/author\/raimund-genes\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/2334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=2334"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/2334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/2451"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=2334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=2334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=2334"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=2334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}