21CTO
Dec 3, 2018 · Information Security
Can Your Keyboard Secrets Be Heard? Inside the Keytap Acoustic Attack
This article explains how the open‑source Keytap project captures short audio snippets from a microphone to reconstruct typed characters, outlines its four‑step process of data collection, model building, keystroke detection, and character identification, and compares it with related acoustic eavesdropping research.
acoustic side-channelaudio keylogginginformation security
0 likes · 8 min read
