"Pixel perfect timing attacks"... using draw APIs to break security boundaries in an application and extract sensitive information https://www.contextis.com/resources/white-papers/pixel-perfect-timing-attacks-with-html5
See also https://www.pcworld.com/article/2082200/listen-up-rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html https://arstechnica.com/information-technology/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/
Reality is an insecure computing substrate.
@cwebber This only reason this works in our favor is because an potential adversary would need to first transmit information past a local (to them) singularity, and for most endeavors, that is too much effort. Unfortunately, if an attacker is able to perceive the approximate location of said singularity "surface", they may be able to launch a passive attack that leaks information.
If *I* were planning it, I'd use a combo of religion and alignment to build an internal structure for broadcast.
@cwebber sounds like something Baudrillard would say but pretty sure that 's not what you mean by this toot toot - but love the literary allusion is all