this post was submitted on 02 Dec 2023
399 points (95.2% liked)
Technology
59174 readers
2235 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
In the article it says that they had to record data from the keyboard ahead of time to plug into the model. This isn’t some magic thing that can listen to any keyboard it has to be trained for one keyboard at a time. It sounds like it’s just a proof that this technique could be used if a malicious actor could get physical access briefly to record the training data - then from that point on all you need is a microphone listening.