@Dark Last I heard, manufacturers were moving from COTS ICs + SHA-x encryption over to ASICs where they control the entire process, including physical signalling methods. You don't show much to go on, but if what you show is representative and consistent then I would begin to imagine there may be some kind of intentional modulation occurring on the porch there.
↧