- cross-posted to:
- technology@lemmy.ml
- cross-posted to:
- technology@lemmy.ml
Laptops more susceptible to having keyboard recorded in quieter areas, like coffee shops, libraries, offices. Previous attempts at keylogging VoIP calls achieved 91.7 percent top-5 accuracy over Skype in 2017 and 74.3 percent accuracy in VoIP calls in 2018.
I thought this type of attack had been known and used for a while. Though in the previous styles I’ve seen it’s usually required at least some understanding of the keyboard layout and preparations (hearing each key pressed previously) I don’t know if they’ve jumped that gap, or made some rather huge assumptions. (The victim has the same keyboard as X or the victim has a known keyboard.)
Actually would be interesting to see laptops randomize their keys for passwords, though that would be hellish to type a known password on. I mostly do my password from touch memory.
I think my question is more “Does this only work on MacBook Pro” though now I wonder how much the angle the Mac Book is open will matter to the program, or if an external microphone will affect it (or completely throw it off).
Not trying to tear this down, but more understand the scope needed for this attack to work, or what could break this approach.
So it can be listened to by a nearby device or over zoom it seems.
Now I’m wondering if they trained the AI on the exact same machine that they used in their testing. Seems to me that tiny variances in the keyboards of even the exact same model could have significant effects on this sort of thing. And then there’s different levels of wear from usage, crumbs in the keyboard, etc.
I’d be amazed if it is actually this accurate across all machines of the same model.
Yeah it’s more a proof of concept really. The fact it works at different distances shows it doesn’t have to be identical but there’s a lot of factors to take into consideration.
Creating a much larger training set with all sorts of variations would be the next step.