New acoustic attack steals data from keystrokes with 95% accuracy::A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%.

  • abraham_linksys@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    1
    ·
    11 months ago

    It looks like they only tested one keyboard from a MacBook. I’d be curious if other keyboard styles are as susceptible to the attack. It also doesn’t say how many people’s typing that they listened to. I know mine changes depending on my mood or excitement about something, I’m sure that would affect it.

  • the_beber@lemm.ee
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    1
    ·
    11 months ago

    Tangentially related: Did you know, that it‘s technically also possible to reconstruct sound via smartphone accelerometers and there‘s no restrictions on which apps can use it. Have fun with this info (:

    • Tangent5280@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      11 months ago

      Reconstruct sound using smartphone accelerators? What do you mean? That accelerometers can act as speakers and produce sound? Or they can act as microphones and record sound as numerical data of vibrations etc? Can you point me to any articles or sources?

    • Aopen@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 months ago

      SpyApp is spying in background

      User thinks “why is battery draining so fast?”

      Opens battery setting

      Oh, this app shouldnt work right now

      Restricts SpyApp’s battery permissions

    • Ironfist@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 months ago

      are you saying that a cellphone accelerometer can be used as a microphone? That sounds… interesting. Do you have a source?

      • Croquette@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 months ago

        I am not the person you are replying to, but if the accelerometers are sensible enough, the vibration of the voice will be picked up by the accelerometer.

        Since the sound we make when talking are periodical, it can probably easier to track that periodicity and reconstruct the sound from there.

        It’s all my (un)educated guess.

    • Lojcs@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Iirc on newer versions of Android there are restrictions on polling rate of sensor data

  • chaorace@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    11 months ago

    laughs in custom multi-layer orthogonal layout with one-of-a-kind enclosure & artisan keycaps

    • malloc@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      11 months ago

      Only plebs type. I write all of my content in machine code with a custom compiler to translate it to QWERTY.

      NSA/CIA/DEA/Interpol/FBI still trying to decode my shitposts to this day

    • Botree@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 months ago

      Never knew my mutant blue switch keeb would come in handy one day. I’ve lubed the blue switches and added foam and tapes so now it sounds like a clicky-thocky blue-brown switches keeb.

  • quadropiss@lemmy.world
    link
    fedilink
    English
    arrow-up
    23
    ·
    11 months ago

    You have to train it on per device + per room basis and you don’t give everything access to your microphones

    • Sloogs@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      11 months ago

      I was just thinking, streamers might have to be careful actually — you can often both see and hear when they’re typing, so if you correlated the two you could train a key audio → key press mapping model. And then if they type a password for something, even if it’s off-screen from their stream, the audio might clue you in on what they’re typing.

  • randint@lemm.ee
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    11 months ago

    Assuming that this does not only work on English words, this is actually really terrifying.

    • lagomorphlecture@lemm.ee
      cake
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 months ago

      I have to assume it could be modified to work on any language. You just have to know the keyboard layout for the language in question do you know what to listen for. Languages with a lot of accents like French maybe could be slightly more complicated but I seriously doubt that it couldn’t be done. I’m honestly not sure how the keyboard is set up for something like Chinese with so very many characters but again if this can be done, that can be done with some dedication and know how.

      • randint@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 months ago

        There are several different ways of inputting Chinese, but generally they all map 2~6 keystrokes to one or multiple Chinese characters, and then the user chooses one. I’d imagine it wouldn’t be much harder.

  • mudcrip@lemm.ee
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    11 months ago

    I find this article kinda mid bc No link to og paper Article doesn’t specify what kinds of keystrokes were being detected (so title seems kind of clickbait)

    • probably not all kinds of keyboards if they only trained model on macbooks? Also no mention of kind of data used to demonstrate 95% accuracy
  • Buddahriffic@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    11 months ago

    When your ADHD fidgeting and a mic attached to your head become a super power. No one can read my keystrokes!

  • Hal-5700X@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    11 months ago

    Will a faraday bag help with a phone? Seeing how it blocks connections. You can unplug desktop mics.

  • HiddenLayer5@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    11 months ago

    A very widespread implication of this is if you are on a call with a bad actor and are on speaker phone, and you enter your password while talking to them, they could potentially get that password or other sensitive information that you typed.

    Assuming it really is that accurate, a real-world attack could go something like this. Call someone and social engineer them in a way that causes them to type their login credentials, payment information, whatever, into the proper place for them. They will likely to this without a second thought because “well, I’m signing into the actual place that uses those credentials and not a link someone sent me so it’s all good! I even typed in the address myself so I’m sure there’s no URL trickery!” And then attempt to extract what they typed. Lots of people, especially when taking calls or voice conference meetings or whatever from their desk, prefer to not hold their phone to their ear of use a headset mic and instead just use their normal laptop mic or an desktop external one. And, most people stop talking when they’re focused on typing which makes it even easier. Hell if you manage to reach, say, the IT server department of a major company and play your cards right, you might even be able to catch them entering a root password for a system that’s remotely accessible.