Three academic papers reveal side-channel vulnerabilities in LLM systems that leak sensitive information through timing patterns and network traffic metadata. Attackers can infer conversation topics with 90%+ accuracy, distinguish specific messages, recover PII like phone numbers, and fingerprint user queries—even through TLS
•3m read time• From schneier.com
Sort: