i don't go into the chat rooms, but i get about one dm a week from some rando or another who's downloaded something from me thanking me for having whatever shit from 30 years ago they haven't heard in forever, it's honestly been a pretty positive experience overall for me.
like this lad last night
a nonzero amount of people will be going to this event with the express purpose of peeing in that ballpit, guaranteed.
And this is why my main account is on the piracy instance.
i hear it's a great time to be flying over russia actually.
Gak.
https://www.theverge.com/2022/8/24/23319847/nintendo-switch-denuvo-drm-anti-cheat-software-emulated-games-pc this news isn't even new. i figured they'd have at least applied it to a game by now.
got hit with a paywall, got around it, leaving this for the lazy
You may have gotten used to covering your webcam, but now you might have to start muffling the sound of your keyboard too.
Laptop users are at risk of having sensitive information including private messages, passwords, and credit card numbers stolen just by typing on their keyboard. A new paper by a team of researchers from British universities shows that artificial intelligence can identify keystrokes by sound alone with 95% accuracy. And as technology continues to develop at a rapid pace, attacks such as these will become more sophisticated.
In this study, experimenters correctly identified keystrokes on a MacBook Pro through a nearby phone recording 95% of the time, and through a recorded Zoom call at a 93% rate.
The research paper details what it calls “acoustic side channel attacks” in which a malicious third party uses a secondary device, like a cell phone sitting next to a laptop or an unmuted microphone on a video-conferencing software such as Zoom, to record the sound of typing. The third party then feeds the recording through a deep-learning A.I. trained to recognize the sound of individual pressed keys to decipher what exactly was typed.
Deep learning (DL) is a subset of machine learning in which computers are taught to process data in a way similar to the human brain—essentially using a multilayered “neural network” to “learn” from large amounts of data and accurately produce insights and predictions. Deep-learning models can recognize patterns in pictures, texts, sounds, and other data. This type of A.I. is in everyday products like digital assistants like Amazon’s Alexa and voice-enabled TV remotes, as well as newer technologies like self-driving cars.
“With the recent developments in both the performance of (and access to) both microphones and DL models, the feasibility of an acoustic attack on keyboards begins to look likely,” the paper said.
The paper, published on August 3, was authored by Joshua Harrison, a software development engineer at Amazon who recently graduated with a Masters of Engineering from Durham University, as well as University of Surrey lecturer Ehsan Toreini and Royal Holloway University of London senior lecturer Maryam Mehrenzhad.
Mitigating the ever-developing threat
Laptops are especially ideal targets for these attacks because of their portability, according to the paper. People often take their laptops to work in public spaces like libraries, coffee shops, and study areas, where the sound of typing can easily be recorded without notice from the targeted user.
One of the main concerns of the paper is that people are unaware of these kinds of attacks, so they do nothing to prevent them.
“The ubiquity of keyboard acoustic emanations makes them not only a readily available attack vector, but also prompts victims to underestimate (and therefore not try to hide) their output,” the paper said. “For example, when typing a password, people will regularly hide their screen but will do little to obfuscate their keyboard’s sound.”
One way to mitigate the threat of this attack is by using stronger passwords with multiple cases, like special characters, upper and lowercase letters, and numbers. Passwords with full words might be more easily deduced and therefore at greater risk of attack.
And while the pressing of the shift key can be recognized by A.I., it cannot yet recognize the “release peak” of the shift key amidst the sound of other keys, “doubling the search space of potential characters following a press of the shift key,” the paper said.
Another simple way to deter these kinds of attacks is by using two-factor authentication. This is a security method that requires two forms of identification to access accounts and data. For instance, the first factor may be a password and the second may be an account activity confirmation through an email or on a separate device.
Biometric authentication, like fingerprint scans and facial recognition, can also lessen the risk of an attack.
But as A.I. continues to evolve, so too will these attacks. The authors of the paper recommended that future studies analyze the use of smart speakers to record keystrokes, “as these devices remain always-on and are present in many homes.”
The authors also suggested that future research should explore the implementation of a language model used in tandem with a deep-learning A.I. Language models, like viral chatbot ChatGPT, are trained on large series of text to recognize patterns of speech.
A language model “could improve keystroke recognition when identifying defined words as well as an end-to-end real-world implementation of an ASC attack on a keyboard,” the paper said.
default packin case and a glass screen protector has seen me through the last year and a bit now.
was getting really confused for a second there.
Navidrome, be your own spotify
would you mind listing off a few of those? it's clunkiness is a lot of why i haven't been able to get into something that by all rights should be right up my alley.
youtube hit me with an ad for a company that makes those little outlet boxes that go in walls. so of course my ass watched the full video, liked it, left a comment, shared the url, the whole nine yards.
yt-dlp, tixati, soulseek-qt, jdownloader, and a short list of various ddl/torrent sites in my head. gog-games, nyaa, 1337x, rin, rutor, rutracker, and honestly if what i'm looking for isn't on any of that, i just assume i don't need it.
https://github.com/ggerganov/kbd-audio idk but feel free to go play with some tools that do the thing and see what happens.
old, mlg horn funny.
limewire ran on the gnutella network
Ayy nice
thought it sounded familiar. nothing on r/reddit, r/modnews, or r/modsupport on it
what else would htx stand for?
i use steam+proton to run cracked steam games on my deck quite frequently actually. just gotta add em as non-steam games and tell em to use whichever proton version
LMDE cuz sometimes i just need dead simple.
idk how to tell you this but that github's been a thing for the last five years. we've had these capabilities in the public sector for at least that long. this article is just about using ai to do it differently.
not really, i'd been under the impression that you needed history for recommendations up till they sent out the email about it earlier this month, so it's just always been on.
i remember ZDtv before TechTV.
archive.org has both xbla and xblig libraries available
the next question is how quickly can we start selling moron mabe patches? cuz that's a great idea.
hot shots part deux
oh they're redoing the urkel special
on the other hand there's a much smaller barrier to them reposting to channel, there's been a few trolls through, and it beat me to posting my own post from here to tele before i could get it on my own channel lmao.
same i finally ran out of my final drops of the stuff a couple months ago, it's a proper tragedy out here.
i use my steamdeck charger for the phone and tablet yeah
uses less than 50mb of ram.
still here
does it to an older copy of discord i use all the time.
the cheat is grounded
the vhs tapes
i mostly use feishin for that, at least on pc.
igg-games has been caught bundling malware and miners before, 1337x isn't moderated for shit, torrentfreak is a news site, jesus christ don't use pirate bay what the fuck is wrong with you, but otherwise solid points.
soulseek is lit, nyaa is legit, and for all else !piracy@lemmy.dbzer0.com and the megathread @ https://lemmy.dbzer0.com/post/10901