A vulnerability was found in a way the ECDH encryption algorithm decrypts data. An attacker with a specialised setup can extract the secret decryption key from a target located in an adjacent room within seconds. This is done by measuring the target's electromagnetic emanations. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7511