In this type of attack, an attacker uses specialized optical sensors to capture the light emissions of a device during cryptographic operations. The attacker can then use this information to deduce the encryption keys or other confidential information.