Schematic representation of the hidden optical communication channel, via which a physically isolated system may be attacked. (Figure: KASTEL/KIT)
This image is part of: IT Security: Computer Attacks with Laser Light. Please note the copyright of this image.