Settings

Theme

WritingHacker: Audio Based Eavesdropping of Handwriting

experts.illinois.edu

1 points by nathanmcrae 3 years ago · 1 comment

Reader

gloyoyo 3 years ago

I've been waiting awhile for the full scope of passive/near-ultrasonic/ultrasonic based attacks patterns to be mapped, and presented. I remember someone mentioned all that's needed is to compress & elaborate(reverbrative updating, frequency hoping[badminton attacks]), and you could full-sweep hack at a relative rate of 1-2 million physical devices at rate(I could believe full world sweep for the best hacker with about 2-5% reception loss[which has been the known rate mentioned in lore])

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection