WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.0K

Well, that is not creepy at all. Though, I am really not surprised. There are all kinds of interesting ways to get information that you think you should not be able to. Many many years ago when USB was "new-ish" there was research done that showed that if you tapped the power (ground) to a house with a older PC with a USB keybaord you could (in some cases) actually read the keys typed on the keyboard of the computer over the power line because of how the USB bus was wired and the lack of filtering on the line. Crazy stuff but.. yeah.

Archive: https://archive.today/IXgPz

From the post: "An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information."

Well, that is not creepy at all. Though, I am really not surprised. There are all kinds of interesting ways to get information that you think you should not be able to. Many many years ago when USB was "new-ish" there was research done that showed that if you tapped the power (ground) to a house with a older PC with a USB keybaord you could (in some cases) actually read the keys typed on the keyboard of the computer over the power line because of how the USB bus was wired and the lack of filtering on the line. Crazy stuff but.. yeah. Archive: https://archive.today/IXgPz From the post: "An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information."

(post is archived)

[–] 2 pts (edited )

A long time ago they were able to develop a system that could recreate what a CRT monitor was showing in near-real-time from a parked vehicle on a street in front of a building. It was a bit glitchy but the fact that they could see what a computer or tv screen was showing just by picking up the radiation emitted is kind of crazy.

Related, TEMPEST https://en.wikipedia.org/wiki/Tempest_(codename), the elimination of such emanations from devices. I remember text files about this in the 1990s on BBSs.