Hackers can tell what people are typing just by listening through a smartphone's microphone
https://www.newsbreakapp.com/n/0MbloCip?s=a3&pd=02h1yVjC Hackers can tell what people are typing just by listening through a smartphone's microphone Daily Mail  Hackers could be able to tell what you are typing on your computer just by listening to your keystrokes through your smartphone's microphone, a new study warns. Shared from News Break Jim Bell's comment:Peter Wright's 1970's book, Spycatcher, described an early, primitive version of this technology.
On August 24, 2019 11:25:42 PM PDT, jim bell <jdb10987@yahoo.com> wrote:
https://www.newsbreakapp.com/n/0MbloCip?s=a3&pd=02h1yVjC
Hackers can tell what people are typing just by listening through a smartphone's microphone
Daily Mail

Hackers could be able to tell what you are typing on your computer just by listening to your keystrokes through your smartphone's microphone, a new study warns.
Shared from News Break
Jim Bell's comment:Peter Wright's 1970's book, Spycatcher, described an early, primitive version of this technology.
By audio waveform signatures. I always assumed this was a 'thing'. But if the audio is ever 'detached' from the source person's ID it becomes sort of useless. -- Sent from my Android device with K-9 Mail. Please excuse my brevity.
On Sunday, August 25, 2019, 02:05:48 PM PDT, Razer <g2s@riseup.net> wrote: On August 24, 2019 11:25:42 PM PDT, jim bell <jdb10987@yahoo.com> wrote:
https://www.newsbreakapp.com/n/0MbloCip?s=a3&pd=02h1yVjC
Hackers can tell what people are typing just by listening through a smartphone's microphone
Daily Mail
Hackers could be able to tell what you are typing on your computer just by listening to your keystrokes through your smartphone's microphone, a new study warns.
Shared from News Break
Jim Bell's comment:Peter Wright's 1970's book, Spycatcher, described an early, primitive version of this technology.
By audio waveform signatures. I always assumed this was a 'thing'.
But if the audio is ever 'detached' from the source person's ID it becomes sort of useless.
I am curious how this is currently done. In Peter Wright's day (MI5), the typewriters that would be listened to might have been IBM Selectrics. In that system, the type ball makes multiple separate motions, rotating and changing angle, before the character is automatically struck. That should contain a wealth of information. Similarly, in the kind of "daisy-wheel" typewriters (or printers) the wheel spins around and is eventually struck. Of course, in both of these cases "you" don't necessarily know from where the ball or wheel came. And in the case of modern, computer keyboards, what noises is the system looking at? The noises the keys themselves might be fairly similar; maybe it is listening for the difference in timing that a human-generated keystroke would exhibit. At first thought, I figure that using Tempest-type (RF emission) techniques on keyboards would be more plausible: The encoder chip which scans keys will likely have precise timings. And it should be possible to program a different encoder chip with intentional emissions of identifiable signals, which can be listened to from a relatively long distance away, tens or hundreds of feet. Jim Bell
On 8/25/19, jim bell <jdb10987@yahoo.com> wrote:
https://www.newsbreakapp.com/n/0MbloCip?s=a3&pd=02h1yVjC
Hackers can tell what people are typing just by listening through a smartphone's microphone
Peter Wright's 1970's book, Spycatcher, described an early, primitive version of this technology.
I am curious how this is currently done. And in the case of modern, computer keyboards, what noises is the system looking at? The noises the keys themselves might be fairly similar; maybe it is listening for the difference in timing that a human-generated keystroke would exhibit.
Search for the series of audio keyboard attack whitepapers that were making their rounds a decade or so ago. (See also TSCM-L, TEMPEST.) Every key sounds physically different, plus the unique function of the person pressing, that key characterization paired with character frequency dictionary analysis, finger length keytime distance, interpress brain timings during language formation, Markov windows, etc. More characters over time, more accuracy. Especially with chosen plaintext, oppurtunity sampling the keyboard upon casual visit to the room, etc.
At first thought, I figure that using Tempest-type (RF emission) techniques on keyboards would be more plausible: The encoder chip which scans keys will likely have precise timings. And it should be possible to program a different encoder chip with intentional emissions of identifiable signals, which can be listened to from a relatively long distance away, tens or hundreds of feet.
Areas of defense are on the market meant to buffer, reclock, encrypt, jam, insulate, out of band, etc... in keyboard hardware, OS software, touch glass, ocular input goggles, and free basic environmental blinding cover... heavy metal music... https://www.youtube.com/results?search_query=anthrax+noise If your adversaries have to risk exposing themselves by getting up close and physical, either you're doing something right, or horribly wrong to be located in the first place, or it's just your way of banging hot Russian spies :) https://duckduckgo.com/?iax=images&ia=images&q=sexy+russian+spies infohash:3A3BC4904B9B562809547FF41ABFE285EB6E4D3C https://www.youtube.com/watch?v=mUqeBMP8nEg
participants (3)
-
grarpamp
-
jim bell
-
Razer