The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.

  • FaceDeer@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I can imagine one way to do this, but it’s a bit of an edge case; if you can get into a video chat with the person and then get them to DM you stuff while on the line, you’d be able to get a recording of their keyboard sounds along with the text it produced.

    There’s probably easier and more reliable ways to compromise someone, though.