Tagged articles
1 articles
Page 1 of 1
21CTO
21CTO
Dec 3, 2018 · Information Security

Can Your Keyboard Secrets Be Heard? Inside the Keytap Acoustic Attack

This article explains how the open‑source Keytap project captures short audio snippets from a microphone to reconstruct typed characters, outlines its four‑step process of data collection, model building, keystroke detection, and character identification, and compares it with related acoustic eavesdropping research.

acoustic side-channelaudio keylogginginformation security
0 likes · 8 min read
Can Your Keyboard Secrets Be Heard? Inside the Keytap Acoustic Attack