WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

380

Well, that is not creepy at all. Though, I am really not surprised. There are all kinds of interesting ways to get information that you think you should not be able to. Many many years ago when USB was "new-ish" there was research done that showed that if you tapped the power (ground) to a house with a older PC with a USB keybaord you could (in some cases) actually read the keys typed on the keyboard of the computer over the power line because of how the USB bus was wired and the lack of filtering on the line. Crazy stuff but.. yeah.

Archive: https://archive.today/IXgPz

From the post: "An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information."

Well, that is not creepy at all. Though, I am really not surprised. There are all kinds of interesting ways to get information that you think you should not be able to. Many many years ago when USB was "new-ish" there was research done that showed that if you tapped the power (ground) to a house with a older PC with a USB keybaord you could (in some cases) actually read the keys typed on the keyboard of the computer over the power line because of how the USB bus was wired and the lack of filtering on the line. Crazy stuff but.. yeah. Archive: https://archive.today/IXgPz From the post: "An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information."

(post is archived)

[–] 6 pts

Just adding in some other spy tech that I know about, feel free to add in anything I missed: -Using wi-fi to get a scan of a building and the position/movements of occupants -using an invisible laser to measure the vibrations on a window to "listen" to any sounds in that room, capturing a conversation -Microphones in those new street lamps -new monitors can also act as a Webcam and see you without your knowledge -hearing the sound of keyboards, a program can recreate what was typed -of course your cell phone tracks your every movement, takes pictures of you covertly and can capture any sound the microphone can pick up -all of your text and emails are used to analyze you and identify you to marketers

[–] 4 pts (edited )

Yeah, not a bad list. Some of them are old but there are older ones too.

A long time ago they were able to develop a system that could recreate what a CRT monitor was showing in near-real-time from a parked vehicle on a street in front of a building. It was a bit glitchy but the fact that they could see what a computer or tv screen was showing just by picking up the radiation emitted is kind of crazy.

Then there are all of the things like using speakers or fan speed to leak data in air-gapped systems. Where there is a will, there is a way.

Oh, all LED's can be used as a prox sensor too. Its a neat application because they can light up while being used as a sensor too. Its not high resolution (at least the projects ive seen) but its kind of crazy.

[–] 2 pts (edited )

A long time ago they were able to develop a system that could recreate what a CRT monitor was showing in near-real-time from a parked vehicle on a street in front of a building. It was a bit glitchy but the fact that they could see what a computer or tv screen was showing just by picking up the radiation emitted is kind of crazy.

Related, TEMPEST https://en.wikipedia.org/wiki/Tempest_(codename), the elimination of such emanations from devices. I remember text files about this in the 1990s on BBSs.

[–] 0 pt (edited )

Using wi-fi to get a scan of a building and the position/movements of occupants

No real world applications exist without lots of external equipment. Unrealistic. This has been discussed on Poal before.

using an invisible laser to measure the vibrations on a window to "listen" to any sounds in that room, capturing a conversation

Same as above. Unrealistic, low quality, many errors.

Microphones in those new street lamps

Plausible. Don't talk about personal shit out loud in public.

new monitors can also act as a Webcam and see you without your knowledge

Very easy to circumvent client side. Don't buy it and complain about it if you don't understand it.

hearing the sound of keyboards, a program can recreate what was typed

Very low reliability. I promise it will faill everytime when it comes up against a two finger typer.

of course your cell phone tracks your every movement, takes pictures of you covertly and can capture any sound the microphone can pick up

Again very easy to circumvent client side

all of your text and emails are used to analyze you and identify you to marketers

Email is gay. Don't use standard text for personal things. Again client side circumvention

All of the things you listed and the OP are nothing but scare tactics to get ignorant users to use specific devices that boast specific securities, that in all actuality, are less secure and have more backdoors. The tech in the OP is laughable at best. My suggestion would be for people to just stop using the devices all together if they are not going to take the time to do research and at least attempt to circumvent the tracking/spying. 90% of the people that read this shit, share it, and are afraid of it have some sort of social media "app" installed on their devices, social media accounts, and use a factory version of windows on their PC. Brainwashed sheep the whole lot of them.

[–] 1 pt

demorilzation kike kiking away like the filthy jew they are