New acoustic attack steals data from keystrokes with 95% accuracy::A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%.

  • abraham_linksys@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    24
    ·
    1 year ago

    It looks like they only tested one keyboard from a MacBook. I’d be curious if other keyboard styles are as susceptible to the attack. It also doesn’t say how many people’s typing that they listened to. I know mine changes depending on my mood or excitement about something, I’m sure that would affect it.

  • the_beber@lemm.ee
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    1 year ago

    Tangentially related: Did you know, that it‘s technically also possible to reconstruct sound via smartphone accelerometers and there‘s no restrictions on which apps can use it. Have fun with this info (:

    • Ironfist@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      are you saying that a cellphone accelerometer can be used as a microphone? That sounds… interesting. Do you have a source?

    • Aopen@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      SpyApp is spying in background

      User thinks “why is battery draining so fast?”

      Opens battery setting

      Oh, this app shouldnt work right now

      Restricts SpyApp’s battery permissions

  • randint@lemm.ee
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    1 year ago

    Assuming that this does not only work on English words, this is actually really terrifying.

    • lagomorphlecture@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      I have to assume it could be modified to work on any language. You just have to know the keyboard layout for the language in question do you know what to listen for. Languages with a lot of accents like French maybe could be slightly more complicated but I seriously doubt that it couldn’t be done. I’m honestly not sure how the keyboard is set up for something like Chinese with so very many characters but again if this can be done, that can be done with some dedication and know how.

      • randint@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        There are several different ways of inputting Chinese, but generally they all map 2~6 keystrokes to one or multiple Chinese characters, and then the user chooses one. I’d imagine it wouldn’t be much harder.

    • malloc@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Only plebs type. I write all of my content in machine code with a custom compiler to translate it to QWERTY.

      NSA/CIA/DEA/Interpol/FBI still trying to decode my shitposts to this day

  • mudcrip@lemm.ee
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    1 year ago

    I find this article kinda mid bc No link to og paper Article doesn’t specify what kinds of keystrokes were being detected (so title seems kind of clickbait)

    • probably not all kinds of keyboards if they only trained model on macbooks? Also no mention of kind of data used to demonstrate 95% accuracy
  • Teal@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Phreaking for the modern era. With phones the key tones are different. With keystrokes it’s not. Are they measuring the time between each key press and using that to come up with possible words?

  • 𝔼𝕩𝕦𝕤𝕚𝕒@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 year ago

    Sweet! More man-made horrors beyond my comprehension! I sure am glad we’re investing our time into things that will never be stolen or misused!

  • HiddenLayer5@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    A very widespread implication of this is if you are on a call with a bad actor and are on speaker phone, and you enter your password while talking to them, they could potentially get that password or other sensitive information that you typed.

    Assuming it really is that accurate, a real-world attack could go something like this. Call someone and social engineer them in a way that causes them to type their login credentials, payment information, whatever, into the proper place for them. They will likely to this without a second thought because “well, I’m signing into the actual place that uses those credentials and not a link someone sent me so it’s all good! I even typed in the address myself so I’m sure there’s no URL trickery!” And then attempt to extract what they typed. Lots of people, especially when taking calls or voice conference meetings or whatever from their desk, prefer to not hold their phone to their ear of use a headset mic and instead just use their normal laptop mic or an desktop external one. And, most people stop talking when they’re focused on typing which makes it even easier. Hell if you manage to reach, say, the IT server department of a major company and play your cards right, you might even be able to catch them entering a root password for a system that’s remotely accessible.

    • Necromnomicon@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      It uses the sounds it records and compares again the messages you send. So in theory it’s layout agnostic.

    • iegod@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      That’s a liberal extension of the definition. I wouldn’t consider this anywhere close to traditional/established key logging.

      • Coreidan@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        No you’re not getting it. They use key loggers to train the AI and they need to use the targets keystrokes to do it. Without that they cannot train the AI to be able to use the microphone to figure the key strokes out.

        It all starts with a traditional keylogger and that’s why this is silly.