On Sunday, August 25, 2019, 02:05:48 PM PDT, Razer <[email protected]> wrote: 
 
On August 24, 2019 11:25:42 PM PDT, jim bell <[email protected]> wrote:
>https://www.newsbreakapp.com/n/0MbloCip?s=a3&pd=02h1yVjC
>
>Hackers can tell what people are typing just by listening through a
>smartphone's microphone
>
>Daily Mail
>
>
>Hackers could be able to tell what you are typing on your computer just
>by listening to your keystrokes through your smartphone's microphone, a
>new study warns.
>
>Shared from News Break 
>
>
>>Jim Bell's comment:Peter Wright's 1970's book, Spycatcher, described an
>>early, primitive version of this technology.

>By audio waveform signatures. I always assumed this was a 'thing'.

>But if the audio is ever 'detached' from the source person's ID it becomes 
>sort of useless.

I am curious how this is currently done.  In Peter Wright's day (MI5), the 
typewriters that would be listened to might have been IBM Selectrics.  In that 
system, the type ball makes multiple separate motions, rotating and changing 
angle, before the character is automatically struck.  That should contain a 
wealth of information.
Similarly, in the kind of "daisy-wheel" typewriters (or printers) the wheel 
spins around and is eventually struck.  Of course, in both of these cases "you" 
don't necessarily know from where the ball or wheel came.  
And in the case of modern, computer keyboards, what noises is the system 
looking at?  The noises the keys themselves might be fairly similar; maybe it 
is listening for the difference in timing that a human-generated keystroke 
would exhibit.
At first thought, I figure that using Tempest-type (RF emission) techniques on 
keyboards would be more plausible:  The encoder chip which scans keys will 
likely have precise timings.  And it should be possible to program a different 
encoder chip with intentional emissions of identifiable signals, which can be 
listened to from a relatively long distance away, tens or hundreds of feet.
                 Jim Bell

  

Reply via email to