malware detection techniques
@thegibson This *could* be real—technically it’s the same thing as exfiltrating private RSA keys by modeling the cpu’s multiplication circuit as an unintentional radio transmitter.
But I suspect it works a lot better in a lab, monitoring just one computer, than in a data center full of servers only some of which are running malware that it wasn’t trained on.
Would be cool to be a tech sweeping the server racks with a wand of detect malware, though. Once.
A bunch of technomancers in the fediverse. This arcology is for all who wash up upon it's digital shore.