The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.

  • Pons_Aelius@kbin.social
    link
    fedilink
    arrow-up
    7
    ·
    1 year ago

    This has basically zero practical application.

    The training data knew which keys were being pressed repeatedly to allow identification.

    So you need physical access to the keyboard to train the system. You cannot just listen in to a person typing on an unknown keyboard and know the keystrokes.

    If you have physical access…a keylogger will do the job with much less effort.

      • Pons_Aelius@kbin.social
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        1 year ago

        True. But who would read a story with the headline:

        “Research team create learning model with zero real world applications.”

        The paper notes that while completely useless, it can be done with off the shelf equipment…but it is still cheaper and actually effective to use a $10 keylogger.

        • CIWS-30@kbin.social
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          I’d read that. Because the honest title, and I’d be curious as to why they’re doing it, and if there might be a niche way to actually make it worth it one day.

    • earthling@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      So you need physical access to the keyboard to train the system.

      You need physical access to a keyboard to train the system. Knowing what keyboard your target uses seems easier than gaining physical access to it, assuming you want to stay undetected.

    • FaceDeer@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      I can imagine one way to do this, but it’s a bit of an edge case; if you can get into a video chat with the person and then get them to DM you stuff while on the line, you’d be able to get a recording of their keyboard sounds along with the text it produced.

      There’s probably easier and more reliable ways to compromise someone, though.