this post was submitted on 02 Dec 2023
439 points (95.6% liked)

Technology

60024 readers
2754 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

Researchers in the UK claim to have translated the sound of laptop keystrokes into their corresponding letters with 95 percent accuracy in some cases.

That 95 percent figure was achieved with nothing but a nearby iPhone. Remote methods are just as dangerous: over Zoom, the accuracy of recorded keystrokes only dropped to 93 percent, while Skype calls were still 91.7 percent accurate.

In other words, this is a side channel attack with considerable accuracy, minimal technical requirements, and a ubiquitous data exfiltration point: Microphones, which are everywhere from our laptops, to our wrists, to the very rooms we work in.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 91 points 1 year ago (2 children)

Quite scary considering the accuracy and how many open mics everyone is surrounded by without even realizing it. Not to mention if any content creator types their password while live streaming or recording they could get their accounts stolen.

[–] [email protected] 47 points 1 year ago (3 children)

One more reason to switch to a password manager, even though they could still find out the master password…

[–] [email protected] 30 points 1 year ago (1 children)

Probably still have some safety if you're using two-factor, or have a master key in addition to a password (e.g. 1Password).

[–] [email protected] 13 points 1 year ago* (last edited 1 year ago) (1 children)

Or use a local password safe like keepass.

[–] [email protected] 2 points 1 year ago

Or host it yourself like the smart one you are

[–] [email protected] 7 points 1 year ago (1 children)

Only if you have to type it in to unlock your vault. Now, bear with me.

Bitwarden (maybe others) lets you set a PIN to unlock your vault. Normally, you would think this is a less secure setup, easier to crack with the method outlined in this article. Except with Bitwarden you have to set up the pin in every browser extension and every app install.

Meaning, unless they have access to your device, the PIN to unlock one instance of Bitwarden could be different from the PIN for another. They also don't have to be strictly 4-digit PINs, either. I highly recommend password managers, but for my money, Bitwarden has all my love.

Disclaimer: I am on no way affiliated with Bitwarden. But I could be if they paid me!

[–] [email protected] 4 points 1 year ago (1 children)

but then I have to remember the PIN for each one of my devices. there should be some kind of app for storing those.

[–] [email protected] 7 points 1 year ago

Do what users at most businesses do, write it on a sticky note and put it on the underside of your keyboard!

Stick around for more tech tips with a real life sysadmin!

[–] [email protected] 4 points 1 year ago (1 children)

Password manager and the LOUDEST MECHANICAL KEYBOARD POSSIBLE you have NO idea what keys I’m pressing with my blues, bitches

[–] [email protected] 6 points 1 year ago (1 children)

That's the whole point though. The louder your keypresses the better.

[–] [email protected] 0 points 1 year ago* (last edited 1 year ago)

laptop

laptop

laptop

I don’t think you read the article

A loud ass mech keyboard would fuck this study up

[–] [email protected] 15 points 1 year ago* (last edited 1 year ago)

This has been a known attack vector for years, and I wonder how no livestreamer has been (publicly) attacked in this way.

I guess in large part this can be attributed to 2FA, passwords just aren't worth much by themselves anymore (well I guess if someone is quick enough they can snipe the OTP as well, but streamers are rarely entering their 2FA while streaming since they're on a trusted device).

In fact the biggest attack vector I'd worry about is the infamous SMS 2FA, which is actually 1FA for password resets, which is actually 0FA "yes dear phone operator I am indeed Mister Beast please move my phone number to this new SIM".