Hack the phone using speaker and microphone? Easy!

Date:

2018-09-05 19:15:06

Views:

78

Rating:

1Like 0Dislike

Share:

Hack the phone using speaker and microphone? Easy!

Modern smartphones offer the user a lot of opportunities, but also expose personal data like passwords and credit card numbers at risk of being stolen. Of course, there are many options to protect your device from antivirus programs to embedded systems passwords. And, as it turned out, quite easy to crack using regular speaker and microphone.

Note that in this case we are talking about devices running the Android operating system. Built-in password protection feature or pattern (when you need to spend points in a particular sequence) has several hundred thousand variants of this pattern, however, according to studies, about 20% of users use 1 of the 12 most common ways to "connect the dots".

the 12 most common types of passwords

But it will, in fact, not all about them. Using data on the most widely used variations, a group of researchers created a program called SonarSnoop. At its core it just went to data input methods, and more specifically, about how sound is reflected from the finger of the user during password entry. The principle of the application is extremely simple: after installation, the program gets right to the speaker control and microphone. Then the speaker starts to constantly lose the sound set at a frequency that is not able to capture the human organ of hearing. But it is able to capture the device's microphone.

Algorithm. «hears» even the slightest distortion to the sound, enveloping the fingers of the person entering the password and recognize the sounds even if you change the position of objects around the speaker. Thanks to the received data it is possible very accurately to build the direction of movement of the finger on the screen. The digital input ordinary password to recognize, even easier than the one you want to "draw". To test the functionality of its technology, the developers used a Samsung Galaxy S4. The algorithm, though not immediately allowed to hack the device, but it helped to narrow it down to 3 keys out of 12. In other words, he was able to discard about 75% of wrong answers.

The developers do not exclude the possibility of using the same vulnerability and Apple smartphones, but the test was not conducted. The danger of this method lies in the fact that it uses the built-in device functions and programs of this kind do not contain malicious code, so they are very hard to calculate.

How do you feel about the safety of personal data? Use 1 of the 12 most common passwords? Let us know in our

Recommended

A review of the iBasso player DX120 — continuing the offensive

A review of the iBasso player DX120 — continuing the offensive

In iBasso is sometimes slow to harness, but then speeding, they race with such speed that the majority of competitors only have to swallow the dust in the corners. Starting his triumphant return , they strengthened the position , but, of course, eve...

An overview of the HiBy player R3 — not a single soft

An overview of the HiBy player R3 — not a single soft

the Company HiBy, known primarily as the developer of music player for iOS and Android, and secondly as the author of the firmware for about half the emerging market players decided that it was time to take their place in the market «iron»,...

Astell&Kern KANN is the most unusual of families

Astell&Kern KANN is the most unusual of families

the Company Astell&Kern is widely known not only to the audiophile — many know her as a producer of very expensive players. Despite the fact that the brand is really a premium, sometimes Astell&Kern still produces a more affordable au...

Comments (0)

This article has no comment, be the first!

Add comment

Related News

Ear headphones FiiO FB1 and Bluetooth receiver µBTR

Ear headphones FiiO FB1 and Bluetooth receiver µBTR

the Last time FiiO is actively coming to market wireless solutions, observing this company's traditional methodology. After the trial balloon in the face it's time of other models and today we'll talk about the budget proposal — h...

Created printing method using sound waves

Created printing method using sound waves

For printing have long been used not only for solid and powdered substances, but also liquid. Although using the latest still have problems: for example, the liquid must have a certain level of viscosity, or the nozzle of the prin...

An overview of the player xDuoo X3II — a notable development

An overview of the player xDuoo X3II — a notable development

If you evaluate the company creates solutions for personal audio in their development relative to its older models, xDuoo will clearly be among the leaders. Starting with budget models, the only justification for which was a reaso...