this post was submitted on 02 Dec 2023
399 points (95.2% liked)

Technology

59174 readers
1811 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Researchers in the UK claim to have translated the sound of laptop keystrokes into their corresponding letters with 95 percent accuracy in some cases.

That 95 percent figure was achieved with nothing but a nearby iPhone. Remote methods are just as dangerous: over Zoom, the accuracy of recorded keystrokes only dropped to 93 percent, while Skype calls were still 91.7 percent accurate.

In other words, this is a side channel attack with considerable accuracy, minimal technical requirements, and a ubiquitous data exfiltration point: Microphones, which are everywhere from our laptops, to our wrists, to the very rooms we work in.

you are viewing a single comment's thread
view the rest of the comments
[–] Cronch@lemmy.world 87 points 11 months ago (2 children)

Quite scary considering the accuracy and how many open mics everyone is surrounded by without even realizing it. Not to mention if any content creator types their password while live streaming or recording they could get their accounts stolen.

[–] vareriu@lemmy.world 46 points 11 months ago (3 children)

One more reason to switch to a password manager, even though they could still find out the master password…

[–] qwertyqwertyqwerty@lemmy.one 29 points 11 months ago (1 children)

Probably still have some safety if you're using two-factor, or have a master key in addition to a password (e.g. 1Password).

[–] mosiacmango@lemm.ee 13 points 11 months ago* (last edited 11 months ago) (1 children)

Or use a local password safe like keepass.

[–] rostby@lemmy.fmhy.net 1 points 11 months ago

Or host it yourself like the smart one you are

[–] mjhelto@lemm.ee 8 points 11 months ago (1 children)

Only if you have to type it in to unlock your vault. Now, bear with me.

Bitwarden (maybe others) lets you set a PIN to unlock your vault. Normally, you would think this is a less secure setup, easier to crack with the method outlined in this article. Except with Bitwarden you have to set up the pin in every browser extension and every app install.

Meaning, unless they have access to your device, the PIN to unlock one instance of Bitwarden could be different from the PIN for another. They also don't have to be strictly 4-digit PINs, either. I highly recommend password managers, but for my money, Bitwarden has all my love.

Disclaimer: I am on no way affiliated with Bitwarden. But I could be if they paid me!

[–] noodlejetski@lemm.ee 2 points 11 months ago (1 children)

but then I have to remember the PIN for each one of my devices. there should be some kind of app for storing those.

[–] mjhelto@lemm.ee 7 points 11 months ago

Do what users at most businesses do, write it on a sticky note and put it on the underside of your keyboard!

Stick around for more tech tips with a real life sysadmin!

[–] Rai@lemmy.dbzer0.com 3 points 11 months ago (1 children)

Password manager and the LOUDEST MECHANICAL KEYBOARD POSSIBLE you have NO idea what keys I’m pressing with my blues, bitches

[–] dubyakay@lemmy.ca 6 points 11 months ago (1 children)

That's the whole point though. The louder your keypresses the better.

[–] Rai@lemmy.dbzer0.com -1 points 11 months ago* (last edited 11 months ago)

laptop

laptop

laptop

I don’t think you read the article

A loud ass mech keyboard would fuck this study up

[–] azertyfun@sh.itjust.works 11 points 11 months ago* (last edited 11 months ago)

This has been a known attack vector for years, and I wonder how no livestreamer has been (publicly) attacked in this way.

I guess in large part this can be attributed to 2FA, passwords just aren't worth much by themselves anymore (well I guess if someone is quick enough they can snipe the OTP as well, but streamers are rarely entering their 2FA while streaming since they're on a trusted device).

In fact the biggest attack vector I'd worry about is the infamous SMS 2FA, which is actually 1FA for password resets, which is actually 0FA "yes dear phone operator I am indeed Mister Beast please move my phone number to this new SIM".