{"id":9150,"date":"2017-08-06T13:45:10","date_gmt":"2017-08-06T09:45:10","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=9150"},"modified":"2019-11-15T15:23:49","modified_gmt":"2019-11-15T11:23:49","slug":"dont-skype-and-type","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/dont-skype-and-type\/9150\/","title":{"rendered":"Don&#8217;t Skype and type"},"content":{"rendered":"<p>Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it\u2019s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.<\/p>\n<p>Click, click, click \u2014 almost every person talking on the phone or Skype knows that his or her conversation partner may be chatting or doing something else while conversing. The sound of typing on a physical computer keyboard is rather recognizable.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>It turns out that with help from machine learning and a computer it is possible to find out what your conversation partner is typing. Almost every keyboard has a slightly different sound for each key, which means you can use a recording of typing to find out which keys have been pressed. The accuracy is not perfect, but it is quite high nonetheless.<\/p>\n<p>At the\u00a0<a href=\"https:\/\/blog.kaspersky.com\/tag\/black-hat\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Black Hat<\/a>\u00a0hacking conference in Las Vegas, we saw a presentation on how to make it happen. According to the researchers, even after the sound has undergone conversions during online transmission, the recordings of key clicks retain sufficient information to feed to a machine-learning system and get back the five most probable key presses. The results for the three test laptops that researchers used to conduct this study were different, but it was possible to retrieve the typed text even for the most \u201cindistinctly clicking\u201d Lenovo laptop.<\/p>\n<p>This is where dictionary-based results come in. People generally type words that make sense; thus, any nonsense can be eliminated. It is enough to know which keyboard layout and language the victim probably used; the demonstration algorithm will deliver an intelligible and plausible result within a few seconds.<\/p>\n<p>The experts claim that this technology might be used even to steal passwords, although that sounds a bit far-fetched. Passwords are too short and do not consist of real words most of the time. At least, we hope they don\u2019t.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9152\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/08\/06134055\/skype-and-type-2add.png\" alt=\"\" width=\"963\" height=\"553\"><\/p>\n<p>The threat of \u201cinput interception\u201d over Skype does not look too serious, but it\u2019s worth knowing about, especially if you sometimes deal with confidential information. And let\u2019s face it, typing during conversations is not very courteous; hence, avoiding that kind of multitasking will both protect your privacy and show respect for your conversation partner.<\/p>\n<p>However, if you find yourself in a middle of an especially long and tiresome conference call, observe the golden rule: Anyone who is not speaking should mute his or her microphone until it\u2019s time to talk.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it\u2019s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.<\/p>\n","protected":false},"author":32,"featured_media":9151,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1388,740,1390,1391,1392,1389,345,1393],"class_list":{"0":"post-9150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-bhusa","9":"tag-black-hat","10":"tag-black-hat-2017","11":"tag-eavesdrop","12":"tag-keyboard","13":"tag-klbh17","14":"tag-skype","15":"tag-spies"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dont-skype-and-type\/9150\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/dont-skype-and-type\/4900\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dont-skype-and-type\/12289\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dont-skype-and-type\/11581\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dont-skype-and-type\/11132\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dont-skype-and-type\/14041\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dont-skype-and-type\/14059\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dont-skype-and-type\/18141\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dont-skype-and-type\/3670\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dont-skype-and-type\/17909\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dont-skype-and-type\/9355\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dont-skype-and-type\/9615\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/dont-skype-and-type\/7199\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dont-skype-and-type\/14362\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/dont-skype-and-type\/8251\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dont-skype-and-type\/17472\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dont-skype-and-type\/17661\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dont-skype-and-type\/17612\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=9150"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9150\/revisions"}],"predecessor-version":[{"id":14819,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9150\/revisions\/14819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/9151"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=9150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=9150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=9150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}