Last year we presented some hardware trojans as a proof of concept for side-channel data exfiltration attack. Pretty blinking lights are sweet, but this time we wanted to give the hungry crowd something more crunchy to bite into. Namely, that age-old problem of how to get data in and out of a device on a secured network, no network all, or even in a SCIF, perhaps... With some hardware voodoo, let's see what manner of electronic telekinesis we can accomplish!
p.s. Our friends who wish to remain nameless say that this is considered trivial "on the other side of the wall". Is it really? Let's see if any show up! That's right, we're laying the bait, let's play spot the fed.