Audio Eavesdropping Exploit Might Make That Clicky Keyboard Less Cool | Hackaday
On Sat, May 7, 2022, 4:28 AM jim bell <jdb10987@yahoo.com> wrote:
https://hackaday.com/2022/05/06/audio-eavesdropping-exploit-might-make-that-...
To be clear, [Georgi Gerganov]’s “KeyTap3” exploit does not use any of the usual RF-based methods we’ve seen for exfiltrating data from keyboards on air-gapped machines. Rather, it uses just a standard microphone to capture audio while typing, building a cluster map of the clicks with similar sounds. 0_0 Link me to these RF-based methods being publicly discussed, and I'll consider this article to not be fake news. Meanwhile audio reconstruction of keystrokes was published to this list like a decade ago, maybe more. Jim what do you think of this? The marketing AIs can guess what you're going to say, or infer what you did from the behaviors of your friends. It's a little worse than microphones.
it's great that keytap3 is publicly accessible, and sad the results are poor, but the approach is challenging. I realise by rf they meant non-keyboard, and that the importance here is of the accessibility to the attack.
participants (2)
-
jim bell
-
Undiscussed Horrific Abuse, One Victim of Many