Eugen Leitl wrote
Link: http://slashdot.org/article.pl?sid=05/09/13/1644259 Posted by: CmdrTaco, on 2005-09-13 17:04:00
from the but-i-love-clicky-keyboards dept. [1]stinerman writes "Three students at UC-Berkley used a 10 minute [2]recording of a keyboard to recover 96% of the characters typed during the session. The article details that their methods did not require a 'training text' in order to calibrate the conversion algorithm as has been used previously. The [3]research paper [PDF] notes that '90% of 5-character random passwords using only letters can be generated in fewer than 20 attempts by an adversary; 80% of 10-character passwords can be generated in fewer than 75 attempts.'"
This technique is decades old. I read an account of the British Secret Service (MI5? 6?) installing a bugged phone next to a cable machine in the London Soviet Embassy in the late 70's, but the events described took place earlier - perhaps in the 60s. Peter Trei
On Wed, 14 Sep 2005 10:06:21 -0400, Trei, Peter said:
This technique is decades old. I read an account of the British Secret Service (MI5? 6?) installing a bugged phone next to a cable machine in the London Soviet Embassy in the late 70's, but
MI5, early 60's or even late 50's. Described in Spycatcher by Peter Wright. Shalom-Salam, Werner
participants (2)
-
Trei, Peter
-
Werner Koch