Researcher demonstrates how attacker could exfiltrate data over airwaves. A while back I remember reading about a similar exploit, but if memory serves me, it used inaudible sound frequencies. Could ...