TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The way people tilt their smartphone 'can give away passwords and pins'

248 pointsby dan1234about 8 years ago

30 comments

kinkoraabout 8 years ago
Interestingly novel!<p>In my university days, long before the days of tablets and smartphones, the computer labs were the usual place where people will congregate to do their assignments or basically kill time on the internet in between classes.<p>One day, my mates and I noticed how annoyingly loud some people type on their keyboards and out of sheer boredom, we decided we could come up with an algorithm to determine what a person was typing simply from recording the sound of the keystrokes from our vantage point. Taking that sound clip, we graphed it out and we proceeded to hash out each &quot;stroke&quot; based on how loud it was in relation to the distance of where we were from the keyboard + the angle of the keyboard.<p>Fun times ensued. ;)
评论 #14090192 未加载
评论 #14088914 未加载
评论 #14091942 未加载
评论 #14091203 未加载
评论 #14088774 未加载
评论 #14090705 未加载
tboyd47about 8 years ago
&gt; We demonstrate how an inactive or even a minimised web page, using JavaScript, is able to listen to and silently report the device motion and orientation data about a user who is working on a separate tab or a separate app on the device.<p>This is brilliant and well-explained.<p>On page 6 of the PDF, the authors include a breakdown of the leakages they found in each browser family. The two that were most significant to me is Chrome&#x27;s &quot;Active&#x2F;Other&quot; leak on iPhones and Safari&#x27;s &quot;Locked&quot; leak. I believe this means that malicious Javascript (1) on Google Chrome on an iPhone on an inactive tab, and (2) on mobile Safari while the screen is locked, can access tilt and motion data at a level of detail sufficient to deduce what the user is typing.
评论 #14087869 未加载
评论 #14091895 未加载
wh-uwsabout 8 years ago
This attack and an annoyance that I see on Android from time to time could be easily mitigated if in Chrome if they would simply ship permissioning for access to hardware devices.<p>There is this annoying popup add that infects the ad networks of a few websites that first smashes the history of the tab and then vibrates your phone and has a page with a bunch of red warning text telling you that you have a virus, your phone is &quot;damaged&quot; and trying to get you to download some crappy virus scamware.<p>No way in hell a random website should be able to make your phone vibrate without your permission much less tell how its moving with the accelerometer.<p>I&#x27;ve google around a lot there is NO WAY to disable this :&#x2F;
评论 #14165475 未加载
maaaatsabout 8 years ago
Relevant: A friend of mine analyzed lock patterns for her thesis. Got some press: <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;08&#x2F;new-data-uncovers-the-surprising-predictability-of-android-lock-patterns&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;08&#x2F;new-data-uncovers-t...</a><p>The patterns are predictable, and can be further narrowed down if you now the hand they normally use.
评论 #14091147 未加载
评论 #14089901 未加载
评论 #14088884 未加载
rangibabyabout 8 years ago
I saw an ATM before that scrambled the number pad on it&#x27;s touchscreen so the numbers were in a different position every time. Would that work to mitigate this attack?
评论 #14089299 未加载
评论 #14090209 未加载
评论 #14088835 未加载
skamoenabout 8 years ago
As a university project, I did something very similar, only using a malicious app. The app would monitor the device state, and record gyro data as soon as the screen was on, but the device was locked. We didn&#x27;t have the time to properly implement a decent classifier, but the data collection was surprisingly effective.
评论 #14088962 未加载
driverdanabout 8 years ago
Source with more details: <a href="https:&#x2F;&#x2F;blogs.ncl.ac.uk&#x2F;security&#x2F;author&#x2F;b2031864&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blogs.ncl.ac.uk&#x2F;security&#x2F;author&#x2F;b2031864&#x2F;</a>
评论 #14093261 未加载
评论 #14092494 未加载
评论 #14091528 未加载
dwighttkabout 8 years ago
How about not letting javascript run when the phone is locked? Heck, on my phone I&#x27;d be fine with not letting it run when the browser tab isn&#x27;t active.<p>What use case am I not thinking of here?
评论 #14090607 未加载
评论 #14090046 未加载
评论 #14097781 未加载
abecedariusabout 8 years ago
Nice hack. I&#x27;ve been using my phone for less and less over the years, out of security concerns, since it&#x27;s my 2fa device and I sometimes check email with it. After the Broadcom wifi thing I even stopped carrying it around. I guess it&#x27;s past time to buy a dedicated 2fa device.
评论 #14090278 未加载
评论 #14090760 未加载
评论 #14089269 未加载
评论 #14090775 未加载
tmslddabout 8 years ago
Quick Fix: at OS level, temporarily disable all sensors while typing on the virtual keyboard.
评论 #14089427 未加载
ge96about 8 years ago
I thought you just make the key board random every stroke and the human has to pick the right, next letter so it&#x27;s not predictable with a known pattern.<p>edit: I like that &quot;Obviously hackers wear hoodies...&quot; hahaha, I like to wear a mask, and see as little as possible, while I mash on the keys hacking into the NSA.<p>edit: it&#x27;s not funny though when you happen to see your server logs and you see various attempts to break in using wordpress-access attacks like forget the one xmlrc or something... I don&#x27;t use Wordpress but man... gotta keep an eye on those logs. Also tracked one of the ips, lead to some site called BoltCloud, looks legit, with a login but... I don&#x27;t know... not sure if you can bounce attacks from a server without that server&#x27;s permission.
stefsabout 8 years ago
&quot;Obviously most hackers wear hoodies and stand in dark rooms&quot;<p>finally!
评论 #14094762 未加载
tomglynchabout 8 years ago
With machine learning these days I&#x27;m sure that accuracy will only increase too.<p>&gt; They say they cracked four-digit pins with 70% accuracy on the first guess and 100% by the fifth guess.<p>I&#x27;d expect within a few months they could have 70% accuracy on the first guess for typing text&#x2F;passwords.
stefanveabout 8 years ago
BlackBerry solved this with their picture code lock <a href="http:&#x2F;&#x2F;n4bb.com&#x2F;blackberry-10-getting-picture-password-unlock-screen&#x2F;" rel="nofollow">http:&#x2F;&#x2F;n4bb.com&#x2F;blackberry-10-getting-picture-password-unloc...</a>
hex1848about 8 years ago
You can usually easily figure out someones connect the dots password simply by looking at the smudge marks on the screen.
评论 #14088045 未加载
评论 #14088414 未加载
评论 #14088348 未加载
koolbaabout 8 years ago
I bet you could do this by analyzing a video of someone holding their phone too.
评论 #14090090 未加载
Adverblesslyabout 8 years ago
Sorry for digressing from the main topic of the article, but isn&#x27;t anyone else bothered by this terrible graph from the article <a href="https:&#x2F;&#x2F;cdn.arstechnica.net&#x2F;wp-content&#x2F;uploads&#x2F;2015&#x2F;08&#x2F;alp-length-breakdown2-640x319.png" rel="nofollow">https:&#x2F;&#x2F;cdn.arstechnica.net&#x2F;wp-content&#x2F;uploads&#x2F;2015&#x2F;08&#x2F;alp-l...</a> ?<p>For example, the bar for Men&#x27;s shopping password length is 3x-4x longer than for Women&#x27;s, but in reality the value (in tiny font) is only ~8% greater (the others are ~4% and ~10%).
cosinetauabout 8 years ago
&gt; They said they&#x27;d told all the major tech companies, like Google and Apple, about the risks but no-one has been able to come up with an answer so far.<p>What about putting and end to tracking gestures?
avipabout 8 years ago
Unbait yourself:<p>&gt;Based on a test set of <i></i>fifty 4-digit PINs<i></i>
SerLavaabout 8 years ago
I wonder if you could hold the phone flat in one hand and press the buttons with the other hand to defeat this. Or wobbling while entering it one-handed.
评论 #14089838 未加载
canuckintimeabout 8 years ago
Blackberry released an excellent app[1] for Android phones that helps solve this.<p>Any option for iOS? Can someone recommend a good 4way privacy screen protector?<p>[1] <a href="http:&#x2F;&#x2F;www.theverge.com&#x2F;2017&#x2F;3&#x2F;23&#x2F;15038364&#x2F;blackberry-privacy-shade-app-smartphone-feature" rel="nofollow">http:&#x2F;&#x2F;www.theverge.com&#x2F;2017&#x2F;3&#x2F;23&#x2F;15038364&#x2F;blackberry-privac...</a>
评论 #14090128 未加载
carapaceabout 8 years ago
(I remember reading that a phone on a desk could be used to figure out what you type on a keyboard on the same desk.)
seccessabout 8 years ago
This attack has been known since at least 2011: <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;legacy&#x2F;event&#x2F;hotsec11&#x2F;tech&#x2F;final_files&#x2F;Cai.pdf?wptouch_preview_theme=enabled" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;legacy&#x2F;event&#x2F;hotsec11&#x2F;tech&#x2F;final_file...</a>
ge96about 8 years ago
I kind of can&#x27;t wait till everything is biologically linked, I don&#x27;t know if it&#x27;s a good idea&#x2F;cost effective. There&#x27;s usually that scene in horror movies, removing eyeballs, removing hands&#x2F;fingers etc... for biometric security.<p>Still the thought of someone snatching my wallet and swiping away at my cards. Where as if the card wasn&#x27;t &quot;active&quot; unless my hand was the one holding it, I don&#x27;t know how... finger print, pulse, heat, embedded RFID chip activates the card... I don&#x27;t know. think DNA-linked money too, but someone could steal your hair... I don&#x27;t know, I&#x27;m just not going to carry more than $20.00 on me in any form of money.<p>random thought too: when everyone has their own API and this replaces social media, why would that happen I don&#x27;t know. If people had custom readers to pull in a person&#x27;s data.
nippooabout 8 years ago
The solution to this - for PINs and passwords at least - is to scramble the keyboard layout. It&#x27;s slow, but if you&#x27;re typing in a 6-digit PIN it doesn&#x27;t take that long.
hbk1966about 8 years ago
Simple solution to the codes, just place the numbers in random locations. I know Runescape used to do this with bank pins.
anotheryouabout 8 years ago
this was proofed 2011 already <a href="https:&#x2F;&#x2F;www.extremetech.com&#x2F;mobile&#x2F;92946-a-wiggly-approach-to-smartphone-keylogging#" rel="nofollow">https:&#x2F;&#x2F;www.extremetech.com&#x2F;mobile&#x2F;92946-a-wiggly-approach-t...</a>
tapmapabout 8 years ago
This is why using fingerprint sensors makes sense. Impossible to guess this.
评论 #14089796 未加载
评论 #14089810 未加载
InitialLastNameabout 8 years ago
This is a great justification for fingerprint unlocking... I almost never need to enter my pin, either at home or (especially) in public.
评论 #14088855 未加载
ziikutvabout 8 years ago
Thanks captain obvious!