• parpol@programming.dev
    link
    fedilink
    arrow-up
    20
    ·
    4 months ago

    Agent 1: “He’s about to type his password. Here we go… 1…2…3…A…B…C”

    Agent 2: “I feel like we could have figured this out with brute-force”

    Agent 1: “Wait! He’s on the move. …no he was just scratching his balls. … Judging from the sound of it, I’d say he hasn’t trimmer his balls for a long time.”

    Agent 2: “The AI picks up at least 15cm long strands, and some breadcrumbs. 50% rye, 50 wheat. Is that nutella and ketchup?”

    Agent 1: “Dear God, what a freak”.

    Agent 2 takes note. “He’s basically a sex offender at this point”

    The future is now.

    • elltee@lemmy.one
      link
      fedilink
      arrow-up
      3
      ·
      4 months ago

      Dude in the thumbnail is Samy. He’s been a bond villain for a long time now.

  • z00s@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Great, now hackers and spies can detect my typing instead of using RATs or Trojans or packet sniffers, or just beating me with a $5 wrench (XKCD)

    Also:

    The trick, which takes advantage of the subtle acoustics created by tapping different keys on a computer, works even without a view of the computer’s keyboard, so long as the hacker has a line-of-sight view of any relatively reflective portion of the target laptop.

    So… Closing the curtains is all it takes to defeat this amazing technological method. GG.

    • douglasg14b@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      4 months ago

      I’m not sure why you’re so dismissive of this? It’s kind of asinine.

      Does everyone everywhere only ever use computers in an enclosed room? Is everyone with something value to exfiltrate easily accessible to kidnap and beat with a wrench?

      This is valuable for corporate espionage, political purposes, or for nation states. If miniaturized, even easier for targeted attacks where it might be difficult to inject malware, or for broad attacks on office workers.

      And the best part is that it doesn’t leave a trace which beating someone with a wrench and malware would do…

      • z00s@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        4 months ago

        You’re not James Bond. Or a 1337 haxx0r. This technology isn’t even new. Why are you stanning this guy? It’s an assinine position to take.

  • FluffyPotato@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    4 months ago

    The article doesn’t mention how it compensates for different keyboards. Like wouldn’t different switches and wear change the sound?

  • AlexWIWA@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    4 months ago

    So how do we fix this? Dumb nerds never think about the consequences of their creations.

    • fruitycoder@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      4 months ago

      From the article: “Even knowing that Kamkar’s silent, invisible, long-distance laser spy trick exists, how does anyone hide their secrets from it? He suggests that companies install double-paned or reflective glass. Some security device companies also sell protection devices that affix to windows and vibrate them to prevent laser microphone spying, and Kamkar concedes he hasn’t tested his attack against those. But he also suggests a safer countermeasure: “Don’t work on computers visible from a window,” he says. “Or just have dirty windows.””

      • AlexWIWA@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 months ago

        Companies can’t even be convinced to have longer passwords on their wifi. And open office plans mean every computer faces a window

          • Ranger@lemmy.blahaj.zone
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            4 months ago

            The problem is the companies aren’t suffering the majority of the consequences of the security breaches, it’s the people these companies have personal information on & that includes people who have never done business with these companies but that these companies purchased data on.

          • AlexWIWA@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            4 months ago

            But I work at companies and I would like my info to not be hacked. Their fuck ups affect employees and customers

    • parpol@programming.dev
      link
      fedilink
      arrow-up
      3
      arrow-down
      2
      ·
      4 months ago

      Play loud music and walk on a treadmill while on the PC. Type using stroke length of your cock to determine which letter to use.

      There, not so dumb now, are we?

  • HowMany@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    2
    ·
    4 months ago

    Oddly enough - all my keystrokes sound exactly the same which makes this person’s claim so much bullshit.

    • Lemongrab@lemmy.one
      link
      fedilink
      arrow-up
      4
      ·
      4 months ago

      Maybe to you, but with a proper algorithmic analysis of the sounds differences can be fingerprinted and differentiated.