The group has also done the same with the phone's mics (which they say samples data at a whopping 44,000 times per second vs. the accelerometer's 100), but note that it's a less likely option given the usual need for some form of user permission. Furthermore, they explained that the accelerometer data rate is already mighty slow, and if phone makers reduced it a bit more, spiPhone would have a hard time doin' its thing. The good news? Considering the strict circumstances needed, these researchers think there's a slim chance that this kind of malware could go into action easily. Looks like our iPhone and MacBook can still be close friends... For now. You'll find more details at the links below.
Georgia Tech spies on nearby keyboards with iPhone 4 accelerometer, creates spiPhone originally appeared on Engadget on Fri, 21 Oct 2011 11:47:00 EDT. Please see our terms for use of feeds.
Permalink | | Email this | CommentsSource: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/dD7vIWTRoE8/
TECHNITROL TAKETWO INTERACTIVE SOFTWARE SYNTEL SYNTAXBRILLIAN SYNOPSYS SYNNEX
No comments:
Post a Comment