Watch this video on YouTube
Which type of attack utilizes common consumer devices to transfer data covertly?