zlacker

[return to "New acoustic attack steals data from keystrokes with 95% accuracy"]
1. lispis+Pq[view] [source] 2023-08-05 19:14:25
>>mikece+(OP)
So they generated training data from one laptop and microphone then generated test data with the exact same laptop and microphone in the same setup, possibly one person pressing the keys too. For the Zoom model they trained a new model with data gathered from Zoom. They call it a practical side channel attack but they didnt do anything to see if this approach could generalize at all
◧◩
2. OtherS+zA[view] [source] 2023-08-05 20:24:31
>>lispis+Pq
I believe that is the generalisable version of the attack. You're not looking to learn the sound of arbitrary keyboards with this attack, rather you're looking to learn the sound of specific targets.

For example, a Twitch streamer enters responses into their stream-chat with a live mic. Later, the streamer enters their Twitch password. Someone employing this technique could reasonably be able to learn the audio from the first scenario, and apply the findings in the second scenario.

◧◩◪
3. yowzad+FB[view] [source] 2023-08-05 20:32:53
>>OtherS+zA
I guess more reason to just use a password manager to autofill your password?
◧◩◪◨
4. kypro+HC[view] [source] 2023-08-05 20:41:31
>>yowzad+FB
Or just use 2fa
◧◩◪◨⬒
5. bee_ri+dE[view] [source] 2023-08-05 20:53:12
>>kypro+HC
If you have 2FA and one part of it is easily figured out, then you have one factor authentication.

If you cared enough about the authentication in the first place to bother with 2FA, then I guess it seems like the reduction there is still something to be worried about, right?

Lots of “two factor authentication” schemes seem to involve just getting a text or something, so, not very secure at all. Of course, this is bad 2FA, but it is popular.

◧◩◪◨⬒⬓
6. GhostW+4M1[view] [source] 2023-08-06 10:05:57
>>bee_ri+dE
which is the point of 2fa – when the 1st factor fails the 2nd holds
[go to top]