The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.

  • earthling@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    So you need physical access to the keyboard to train the system.

    You need physical access to a keyboard to train the system. Knowing what keyboard your target uses seems easier than gaining physical access to it, assuming you want to stay undetected.