% METHOD: Side Channel Analysis % REMEMBER: % WHAT: % HOW: % WHEN: % WHO: % URGENCY: Side Channel attacks are possible by disregarding the abstraction of software into pure logic: the physical effects of the running of the software become backdoors to observe its functioning, both threatening the control of processes and the re-affirming the materiality of software. % NOTE: % WARNING: ** engineers are good guys! ** % EXAMPLE: https://www.tek.com/sites/default/files/media/image/119-4146-00%20Near%20Field%20Probe%20Set.png.jpg % http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3377 % SEEALSO: % SOURCE: