Comment Re:Layman interpretation (generally) (Score 1) 264
I was skeptical until I recalled how the encryption will pass through a loop or not at some order of magnitude frequency that can be picked up by the Mic. For any busy server with requests popping in and out at various intervals, there would be more noise from the multiple processes that might be doing encryption work or just varying workload (db's, web apps etc). This is noise on the same order as the encryption work in some cases. The web server or ssh server (using GPG but not encrypting communication?) will also be doing encryption with a different key and creating more noise. Of course both keys can be gotten in the case of key-key noise, but in a server room full of the things, it's just one more layer of variables.
What I don't get is that GPG's implementation is doing more or less work based the encryption routines being executed. Optimization always leads to saturation unless memory traffic is the culprit (can't optimize memory reads infinitely). Would read the paper, but oh look at the time.
What I don't get is that GPG's implementation is doing more or less work based the encryption routines being executed. Optimization always leads to saturation unless memory traffic is the culprit (can't optimize memory reads infinitely). Would read the paper, but oh look at the time.