% METHOD: Side Channel Analysis
% REMEMBER:
% WHAT:
% HOW:
% WHEN:
% WHO:
% URGENCY: Side Channel attacks are possible by disregarding the abstraction of software into pure logic: the physical effects of the running of the software become backdoors to observe its functioning, both threatening the control of processes and the re-affirming the materiality of software.
% NOTE:
% WARNING: **
engineers are good guys!
**
% EXAMPLE:
https://www.tek.com/sites/default/files/media/image/119-4146-00%20Near%20Field%20Probe%20Set.png.jpg
% http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3377
% SEEALSO:
% SOURCE: