No wireless. Less space than a Nomad. Lame.
Our attack, which is an extension of the last-level cache attacks of Yarom et al. [23], allows a remote adversary recover information belonging to other processes, other users and even other virtual machines running on the same physical host as the victim web browser. We describe the fundamentals behind our attack, evaluate its performance using a high bandwidth covert channel and finally use it to construct a system-wide mouse/network activity logger.
cuz the arm chair expert just said so!
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.