While effective, you’re not going to set any data transmission records using this method.

Keylogged data could be exfiltrated in realtime.

The closer you are to the target, the higher the transmission speed.

Researchers extract data from air-gapped PC by monitoring RAM’s electromagnetic radiation