<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Screaming Channels - Response from Nordic?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/38537/screaming-channels---response-from-nordic</link><description>Recently, the side-channel attack &amp;quot;Screaming Channel&amp;quot; was described in a paper ( http://s3.eurecom.fr/tools/screaming_channels/ ). 
 The authors demonstrate a remote, passive, side-channel attack on nrf52 that allows data to be compromised if the processor</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 19 Sep 2018 11:15:24 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/38537/screaming-channels---response-from-nordic" /><item><title>RE: Screaming Channels - Response from Nordic?</title><link>https://devzone.nordicsemi.com/thread/149401?ContentTypeID=1</link><pubDate>Wed, 19 Sep 2018 11:15:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:95516774-020b-4fc3-bfbb-e99e4d0d4576</guid><dc:creator>haakonsh</dc:creator><description>&lt;p&gt;Double post: &lt;a href="https://devzone.nordicsemi.com/support-private/support/214130"&gt;https://devzone.nordicsemi.com/support-private/support/214130&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>