TechShoutTechShout
  • Home
  • Features
    FeaturesShow More
    games that are like minecraft
    34 Games Like Minecraft: Explore, Build, Survive With Friends
    Aug 1, 2024
    Fairy-tale Tower
    27 Magical Minecraft Fairy Builds for Every Fantasy Lover
    Aug 1, 2024
    Face Recognition Search Engines
    Top 9 Face Recognition Search Engines for Accurate Results
    May 6, 2024
    AI Headshot Photo Generators
    11 AI Headshot Generators For Professional Photos [Free & Paid]
    May 6, 2024
    Snapchat Planets Order In Friend Solar System
    Snapchat Planets Order In Friend Solar System: Meaning & How It Works
    May 2, 2024
  • Alternatives
    AlternativesShow More
    Game Like Gang Beasts
    14 Must-Play Games Like Gang Beasts For Party Game Enthusiasts
    Jan 6, 2024
    games like kenshi
    22 Games Like Kenshi For The Intrepid Player
    Dec 13, 2023
    Omegle Alternatives
    13 Omegle Alternatives For Random Video Chatting [2024]
    Jan 6, 2024
    Best ThinkGeek Alternatives
    17 Best ThinkGeek Alternatives: Ultimate Guide To Geek Shopping
    Nov 19, 2023
    Games like Core Keeper
    18 Games like Core Keeper: [The Ultimate Guide]
    Jan 3, 2024
  • Categories
    • Apple
    • Games
    • Internet
    • Mobile Phones
    • Gadgets
    • Code
    • Software
    • Hardware
    • Cryptocurrency
    • Artificial Intelligence
    • Laptops
    • Business
    • Security
    • Electric
    • Social Media
  • About Us
    • Who We Are
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
Reading: AI Model Can Steal Passwords By Listening To You Type
Share
Font ResizerAa
TechShoutTechShout
Font ResizerAa
  • Home
  • Alternatives
  • Features
  • Games
  • Guides
Search
  • Home
    • About Us
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
    • Sitemap
  • Categories
    • Alternatives
    • Anime
    • Apple
    • Artificial Intelligence
    • Business
    • Code
    • Cryptocurrency
    • Electric
    • Features
    • Gadgets
    • Games
    • General
    • Guides
    • Hardware
    • Internet
    • Laptops
    • Mobile Phones
    • Science
    • Security
    • Social Media
    • Software
    • Space
    • Tech Reviews
    • TVs
Follow US
Home > Artificial Intelligence > AI Model Can Steal Passwords By Listening To You Type

AI Model Can Steal Passwords By Listening To You Type

Bhavesh Shah
By Bhavesh Shah - Senior Writer Last updated: Nov 2, 2023
2 Min Read
SHARE

Malware Virus Hacker

A group of computer scientists have been able to train an AI deep learning model to recognize keystrokes with 95% accuracy.

This brings up the deeply troubling possibility of bad actors being able to do the same in order to steal passwords by merely recording the sound of keystrokes.

Such an attack is called a side-channel attack and does not require hackers to gain access to the victim’s device. It can be carried out by collecting signals being emitted by the targeted hardware.

Read More

chatgpt 3
Man Claims ChatGPT Saved His Dog’s Life By Diagnosing The Problem The Vet Couldn’t
What You Need to Know About AI Website Builders

As per the research conducted by Durham University, Royal Holloway University of London and University of Surrey researchers, when trained on keystrokes recorded by a nearby phone, the machine learning (ML) classifier achieved an accuracy of 95%.

When trained on keystrokes recorded using the video-conferencing software Zoom, it was able to reach an accuracy of 93%.

The researchers used an Apple MacBook Pro 16-inch (2021) with 16 GB of memory and the M1 Pro processor, notes ZDNet. They recorded the laptop’s keyboard clicks on an iPhone 13 Mini placed on a microfiber cloth about 7 inches away from the laptop as well as Zoom’s built-in recording function on the MacBook.

In both the types of experiments, 36 of the laptop’s keys were used, with each pressed 25 times in a row, varying in pressure and finger, and a single file containing all 25 presses.

Based on the success of the classifier at being able to identify the keys being pressed, the study shows that side channel attacks to steal passwords or sensitive data being typed can easily be executed using off-the-shelf equipment and algorithms.

Some of the suggested methods to mitigate the risk of such attacks currently include:

  • Switching to touch typing.
  • Varying your typing style.
  • Using a mix of lower case and upper case alphabets, special characters and numbers for passwords.
  • Enabling multi-factor authentication.
  • And (for vendors) adding fake keystrokes to VoIP apps like Zoom or Skype.
Was this article helpful?
YesNo

You Might Also Like

Bringing APIs To Blockchain’s Decentralized Web3

Top AI Experts & CEOs Issue “Risk Of Extinction” Warning

How Artificial Intelligence will Reform the Gaming Landscape [Case Study]

How Conversational AI Can Give Your Business A Competitive Edge

OpenAI Introduces ChatGPT, Whisper APIs For Developers

Share This Article
Facebook Twitter Flipboard Pinterest Copy Link Print
Share
bhavesh-s
By Bhavesh Shah Senior Writer
With a degree in Information Technology and a career spanning over 7 years in tech coverage, Bhavesh Shah is currently working at TechShout as a Senior Writer. He is known for his in-depth features and articles on every exciting aspect of consumer technology. Having worked at a startup for over a year, he is also deeply interested in tech that affects businesses, big and small. But it's not all work and no play for Bhavesh. He's had an insatiable passion for gaming ever since his first encounter with Half-Life 2.
Previous Article smartphone-users Why Are Phones A Cybersecurity Weak Spot?
Next Article iPhone With Protective Case Apple iPhone Crash Detection Saves Yet Another Life

Trending Stories

Demand Planning
Software

Top Features of Advanced Demand Planning Software

games that are like minecraft
Features

34 Games Like Minecraft: Explore, Build, Survive With Friends

Fairy-tale Tower
Features

27 Magical Minecraft Fairy Builds for Every Fantasy Lover

Business Automation POS
Business

How To Boost Productivity with Data Analytics & Automation of Business Operations

dress to impress dti outfit
Games

Roblox Dress To Impress (DTI) Codes (August 2024) *Updated*

Cybersecurity - Tackling Multi-Vector Attacks
Security

Cybersecurity Resilience: Tackling Complex Multi-Vector Attacks

Follow us on Social Media:

Facebook Twitter Youtube Pinterest

©TechShout.com 2005 - 2024. All Rights Reserved.

More from TechShout

  • About Us
  • Privacy Policy
  • Editorial Policy
  • Contact Us
  • Advertise
  • Sitemap
Welcome Back!

Sign in to your account

Lost your password?