Apparently there's a way to steal cryptographic keys from mobile devices, leaving the user's info wide open for theft.
Crypto Keys Can Be Stolen from Mobile Devices : Read more
Crypto Keys Can Be Stolen from Mobile Devices : Read more
is made rather implausible by the very next paragraph.Unlike physical attacks, SPA and DPA attacks are non-invasive, easily-automated, and can be mounted without knowing the design of the target device.
In short, for most devices, you have to be able to measure it's power consumption with very high accuracy and precision, far more than you can get passively from a user sitting across the room.CR's vice president of technology Benjamin Jun saying that attackers would need to use special equipment that measures electromagnetic signals emitted by chips inside the device. Attackers could also attach a sensor to the device's power supply as well, however that would be more "hands on" than the former approach.