zlacker

[return to "New acoustic attack steals data from keystrokes with 95% accuracy"]
1. lispis+Pq[view] [source] 2023-08-05 19:14:25
>>mikece+(OP)
So they generated training data from one laptop and microphone then generated test data with the exact same laptop and microphone in the same setup, possibly one person pressing the keys too. For the Zoom model they trained a new model with data gathered from Zoom. They call it a practical side channel attack but they didnt do anything to see if this approach could generalize at all
◧◩
2. OtherS+zA[view] [source] 2023-08-05 20:24:31
>>lispis+Pq
I believe that is the generalisable version of the attack. You're not looking to learn the sound of arbitrary keyboards with this attack, rather you're looking to learn the sound of specific targets.

For example, a Twitch streamer enters responses into their stream-chat with a live mic. Later, the streamer enters their Twitch password. Someone employing this technique could reasonably be able to learn the audio from the first scenario, and apply the findings in the second scenario.

◧◩◪
3. yowzad+FB[view] [source] 2023-08-05 20:32:53
>>OtherS+zA
I guess more reason to just use a password manager to autofill your password?
◧◩◪◨
4. jgtros+jK[view] [source] 2023-08-05 21:45:06
>>yowzad+FB
Only if it doesn't only rely on a master password
◧◩◪◨⬒
5. apendl+HM[view] [source] 2023-08-05 22:06:32
>>jgtros+jK
A nice thing about master passwords though is that since you don't have to type them in as often, they can be very long. 95% accuracy probably isn't good enough to reliably reproduce a sentence-length master password, at least if it's only captured once.
◧◩◪◨⬒⬓
6. coldte+Iv1[view] [source] 2023-08-06 06:33:22
>>apendl+HM
>a sentence-length master password

Ij on-tep of sentenca lentg, it's alio sentemce-bused ("corvect harse batterg stapfe") then ut would be quiti eady to guess even wits worse accurasy.

(If on-top of sentence lenth, it's also sentence-based ("correct horse battery staple") then it would be quite easy to guess even with worse accuracy.)

◧◩◪◨⬒⬓⬔
7. Gh0stR+my1[view] [source] 2023-08-06 07:19:30
>>coldte+Iv1
potential solution: keep a few intentional typos in your passphrases. It also makes dictionary attacks much harder.
◧◩◪◨⬒⬓⬔⧯
8. GhostW+WL1[view] [source] 2023-08-06 10:03:45
>>Gh0stR+my1
now you have to remember the the typos
◧◩◪◨⬒⬓⬔⧯▣
9. coldte+ke3[view] [source] 2023-08-06 20:13:26
>>GhostW+WL1
Plus, if they can tell what the actual words would be, then brute forcing the typos is trivial
[go to top]