Researchers in the UK claim to have translated the sound of laptop keystrokes into their corresponding letters with 95 percent accuracy in some cases.

That 95 percent figure was achieved with nothing but a nearby iPhone. Remote methods are just as dangerous: over Zoom, the accuracy of recorded keystrokes only dropped to 93 percent, while Skype calls were still 91.7 percent accurate.

In other words, this is a side channel attack with considerable accuracy, minimal technical requirements, and a ubiquitous data exfiltration point: Microphones, which are everywhere from our laptops, to our wrists, to the very rooms we work in.

  • Cronch@lemmy.world
    link
    fedilink
    English
    arrow-up
    90
    ·
    1 year ago

    Quite scary considering the accuracy and how many open mics everyone is surrounded by without even realizing it. Not to mention if any content creator types their password while live streaming or recording they could get their accounts stolen.

    • vareriu@lemmy.world
      link
      fedilink
      English
      arrow-up
      45
      ·
      1 year ago

      One more reason to switch to a password manager, even though they could still find out the master password…

      • qwertyqwertyqwerty@lemmy.one
        link
        fedilink
        English
        arrow-up
        28
        ·
        1 year ago

        Probably still have some safety if you’re using two-factor, or have a master key in addition to a password (e.g. 1Password).

      • Ænima@lemm.ee
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        Only if you have to type it in to unlock your vault. Now, bear with me.

        Bitwarden (maybe others) lets you set a PIN to unlock your vault. Normally, you would think this is a less secure setup, easier to crack with the method outlined in this article. Except with Bitwarden you have to set up the pin in every browser extension and every app install.

        Meaning, unless they have access to your device, the PIN to unlock one instance of Bitwarden could be different from the PIN for another. They also don’t have to be strictly 4-digit PINs, either. I highly recommend password managers, but for my money, Bitwarden has all my love.

        Disclaimer: I am on no way affiliated with Bitwarden. But I could be if they paid me!

        • noodlejetski@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          but then I have to remember the PIN for each one of my devices. there should be some kind of app for storing those.

          • Ænima@lemm.ee
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            1
            ·
            1 year ago

            Do what users at most businesses do, write it on a sticky note and put it on the underside of your keyboard!

            Stick around for more tech tips with a real life sysadmin!

      • Rai@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 year ago

        Password manager and the LOUDEST MECHANICAL KEYBOARD POSSIBLE you have NO idea what keys I’m pressing with my blues, bitches

        • dubyakay@lemmy.ca
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          1 year ago

          That’s the whole point though. The louder your keypresses the better.

          • Rai@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            3
            ·
            edit-2
            1 year ago

            laptop

            laptop

            laptop

            I don’t think you read the article

            A loud ass mech keyboard would fuck this study up

    • azertyfun@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      1 year ago

      This has been a known attack vector for years, and I wonder how no livestreamer has been (publicly) attacked in this way.

      I guess in large part this can be attributed to 2FA, passwords just aren’t worth much by themselves anymore (well I guess if someone is quick enough they can snipe the OTP as well, but streamers are rarely entering their 2FA while streaming since they’re on a trusted device).

      In fact the biggest attack vector I’d worry about is the infamous SMS 2FA, which is actually 1FA for password resets, which is actually 0FA “yes dear phone operator I am indeed Mister Beast please move my phone number to this new SIM”.