The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.

  • Pons_Aelius@kbin.social
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    This has basically zero practical application.

    The training data knew which keys were being pressed repeatedly to allow identification.

    So you need physical access to the keyboard to train the system. You cannot just listen in to a person typing on an unknown keyboard and know the keystrokes.

    If you have physical access…a keylogger will do the job with much less effort.

      • Pons_Aelius@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        True. But who would read a story with the headline:

        “Research team create learning model with zero real world applications.”

        The paper notes that while completely useless, it can be done with off the shelf equipment…but it is still cheaper and actually effective to use a $10 keylogger.