{"id":6381,"date":"2016-12-01T00:00:00","date_gmt":"2016-11-30T23:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=6381"},"modified":"2019-04-01T08:56:32","modified_gmt":"2019-04-01T06:56:32","slug":"future-love-yesterday-2","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/zukunft-lief-doch-gestern-schon-2\/","title":{"rendered":"Future? It was already on yesterday!"},"content":{"rendered":"<p>Today's EWLAN<span id=\"urn:enhancement-15d31d5e-afbf-0d5f-6aaa-0013556df26a\" class=\"textannotation disambiguated wl-thing\">Infrastructures<\/span> operate at 2.4 and 5 GHz - a frequency range in which water interacts with electromagnetic waves. Anyone with an old microwave oven that, when switched on, emits the <span id=\"urn:enhancement-62036a0b-997d-7e52-2e46-4c244010cf81\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-The people who have problems with reception can tell you a thing or two about it.<\/p>\n<p>But how does something like this become a security problem? Through the clever, but hardly imaginable use of applications. But one after the other...<\/p><div id=\"great-451775756\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>The human body consists of more than 50 percent water. We humans also interact with the <span id=\"urn:enhancement-00738d59-9cc1-c76d-f62c-e667a68fe295\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>. These \"disturbances\" are by far not as massive as with old microwaves, but measurable!<\/p>\n<p>If one combines the information of several <span id=\"urn:enhancement-4a51fe3a-4d21-ee6c-1888-f1b2e830c095\" class=\"textannotation disambiguated wl-thing\">Antennas<\/span>The railgun in the Schwarzenegger film Eraser is not so far-fetched. So the \"railgun\" in the Schwarzenegger film \"Eraser\" is not so far-fetched.<\/p>\n<p>Recent research even allows to distinguish gestures with arm or fingers in space - just remember Tom Cruise in \"Minority Report\"!<\/p>\n<p>Scanning through walls and detecting movements in electromagnetic fields are nothing new: For example, police can use them to gain information about people taken hostage without entering the room.<\/p>\n<p>Even if the systems are more sophisticated and emit waves: The principle is the same.<\/p>\n<h3>See through walls<\/h3>\n<p>But the possibilities go much further: current research shows how to determine the PIN on a mobile device just by evaluating generally available information at a <span id=\"urn:enhancement-c863205f-c820-fe6e-11df-84c9b8140d8d\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-<span id=\"urn:enhancement-baeaa0f8-bf79-0b91-c3a0-8e04d15ed029\" class=\"textannotation disambiguated wl-thing\">Router<\/span>.<\/p>\n<p>Modern variants use several <span id=\"urn:enhancement-2689a6f2-273f-5138-ac27-badbb6fa5053\" class=\"textannotation disambiguated wl-thing\">Antennas<\/span>, the signal reception strength can be read out easily (CSI - Channel Strength Information). If a mobile device is connected to the <span id=\"urn:enhancement-01080432-80d6-f481-a4e1-d75f17e28f55\" class=\"textannotation disambiguated wl-thing\">Router<\/span> connected, there are minimal changes in the reception strengths during (PIN) entry: due to the movement of the hand in the room where it is connected to the <span id=\"urn:enhancement-101045b8-9f12-49ae-c3db-d80f9d4d2450\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>-waves interacts, and by the minimally changed orientation of the device.<\/p>\n<p>If the changes in reception strength are correlated, there is a probability of up to 81.8 percent of recognizing a ten-digit PIN that has been entered - without any compromise of the terminal device itself. This is where the purely academic approach to a future threat becomes an actual problem!<\/p>\n<p>For a potential attacker, it is not even necessary to have a public <span id=\"urn:enhancement-b03449e6-8bd3-defc-bb69-fdc92cf90abb\" class=\"textannotation disambiguated wl-thing\">Hotspot<\/span> in a caf\u00e9. He simply sets a so-called rogue <span id=\"urn:enhancement-47b61993-af7e-1885-b29c-0f74697c29d4\" class=\"textannotation disambiguated wl-thing\">Access Point<\/span> on, under an existing or a generic name (\"<span id=\"urn:enhancement-d2a3b783-1d68-0ac8-9fba-eb26003ea0f9\" class=\"textannotation disambiguated wl-thing\">WLAN<\/span>\", \"freeWiFi\"...).<\/p>\n<p>The process can even be automated to the point where the rogue <span id=\"urn:enhancement-048a22c1-1d14-f424-716c-be4398b74972\" class=\"textannotation disambiguated wl-thing\">Access Point<\/span> automatically checks according to which <span id=\"urn:enhancement-416cc816-bc07-b52d-48d4-0b2b735fa568\" class=\"textannotation disambiguated wl-thing\">WiFi<\/span>-name devices, and also offers these names. This leads to devices (often without any user interaction) offering such <span id=\"urn:enhancement-ab37a89a-2d97-da3f-95d2-318291453223\" class=\"textannotation\">Nets<\/span> use automatically.<\/p>\n<h3><span id=\"urn:enhancement-e7362c8f-1566-79c0-7632-0116797784aa\" class=\"textannotation disambiguated wl-thing\">Security<\/span>: always new, always exciting<\/h3>\n<p>The danger in the use of public <span id=\"urn:enhancement-5370b8c6-167b-ea80-a4a2-3333565198c3\" class=\"textannotation disambiguated wl-thing\">Hotspots<\/span> So it is no longer just that the <span id=\"urn:enhancement-40491977-65a6-cac2-d5da-fd9150f58d7f\" class=\"textannotation disambiguated wl-thing\">Communication<\/span> can be intercepted. Meanwhile, local inputs can also be evaluated on the device.<\/p>\n<p>So, especially for critical applications, it is advisable to rely on additional mechanisms such as a fingerprint. Such scenarios are one reason why <span id=\"urn:enhancement-a1e19d75-349d-074c-18e3-4ad6de49fee9\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-<span id=\"urn:enhancement-c0ddcfa0-9ff8-3c99-cace-0607dc3ebd21\" class=\"textannotation disambiguated wl-thing\">Security<\/span> is so interesting and will probably remain so.<\/p>\n<p>Threats are always coming from new and sometimes completely unexpected directions - as <span id=\"urn:enhancement-45d60ede-44cc-787c-b8bd-26b14ac85007\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-As security managers, we must identify these risks, develop appropriate countermeasures, and implement them.<\/p>\n<p>In the specific case, it is recommended to confirm previous \"<span id=\"urn:enhancement-27dd846e-d481-f2bb-ff23-baf451ef46ad\" class=\"textannotation\">Best Practices<\/span>\". The access of devices to public <span id=\"urn:enhancement-571f0db1-f2f5-abd9-e3b4-28c85e01ebab\" class=\"textannotation disambiguated wl-thing\">Hotspots<\/span> has risk potential. In the past, it was the possibility of <span id=\"urn:enhancement-04b09d91-846e-1c65-c882-d7409ad8d8a1\" class=\"textannotation disambiguated wl-thing\">Communication<\/span> Today, there is also the additional risk that PINs and other entries can be intercepted.<\/p>\n<p>Depending on the criticality of the <span id=\"urn:enhancement-ee4ce794-15ee-2915-bb15-8acfc1c92564\" class=\"textannotation\">Data<\/span> thus another scenario that should play a role in risk considerations.<\/p>","protected":false},"excerpt":{"rendered":"<p>Do you know that too? You stumble across a topic, think it's science fiction - and one day you realize that the future has long since become reality...<\/p>","protected":false},"author":52,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[21,7,740],"tags":[],"coauthors":[24313],"class_list":["post-6381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-meinung","category-mag1612","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Kennen Sie das auch? Sie stolpern \u00fcber ein Thema, halten es f\u00fcr Science-Fiction \u2013 und merken eines Tages, dass die Zukunft l\u00e4ngst Realit\u00e4t ist&#8230;<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1612\/\" rel=\"category tag\">MAG 16-12<\/a>","author_info_v2":{"name":"Raimund Genes, Trend Micro","url":"https:\/\/e3mag.com\/en\/author\/raimund-genes\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=6381"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=6381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=6381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=6381"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=6381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}