Faraday Cage

A Faraday cage is a metal cage or enclosure that distributes an applied electrical charge evenly across its surface, protecting anything inside from exposure to electromagnetic fields or electrical charge. Invented in 1836 by Michael Faraday but previewed decades earlier by Benjamin Franklin in simpler form, Faraday cages hold electrical charge, but when an outside charge is applied, the electric fields cancel each other out. The inside of the cage, room, or enclosure remains free of any charge.

Faraday cages are used for many everyday items, including microwaves, where the cage protects users from many of the damaging electromagnetic fields within the enclosure. Vehicles and airplanes also utilize Faraday technology – if lightning strikes the exterior, the electrical field generated spreads across the surface of the vehicle or plane and the charges cancel each other, protecting passengers inside from being electrocuted.

Threats to Faraday cage security

Some businesses use Faraday cages to protect their computers or servers, attempting to shield data from outside electromagnetic forces. However, this method isn’t foolproof, as researchers from one Israeli university recently revealed. Although Faraday cages protect their interior from electromagnetic fields, ordinary magnetic fields can still pass through them. If sensitive data is being stored inside a large Faraday cage, such as in a data center, electromagnetic fields can’t penetrate the interior, but some magnetic fields can.

The Israeli researchers identified two methods of extracting data stored within a Faraday cage. The ODINI method manipulates the magnetic output of the CPU, where data is being processed, and allows thieves to extract data through a magnetic field. MAGNETO, the second method, uses a smartphone application with a magnetic field feature to extract data. The methods are similar, but MAGNETO requires a thief to be closer to a Faraday cage to steal the data within because they’re using a smartphone app. Researchers warn that those who use Faraday cages to protect sensitive data should be aware of these weaknesses.

Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Security Breach

Any unauthorized access to a computer network, computer data, devices, or applications is...

Productivity Software

Productivity software is a broad term used for software applications that increase the...

3PL (Third-Party Logistics)

Third-party logistics, typically referred to by the acronym 3PL, is the process a...