To be clear, [Georgi Gerganov]’s “KeyTap3” exploit does not use any of the usual RF-based methods we’ve seen for exfiltrating data from keyboards on air-gapped machines. Rather, it uses just a standard microphone to capture audio while typing, building a cluster map of the clicks with similar sounds.
0_0
Link me to these RF-based methods being publicly discussed, and I'll consider this article to not be fake news.
Meanwhile audio reconstruction of keystrokes was published to this list like a decade ago, maybe more. Jim what do you think of this?
The marketing AIs can guess what you're going to say, or infer what you did from the behaviors of your friends. It's a little worse than microphones.