• Gaywallet (they/it)@beehaw.org
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    The findings are interesting, but the study design is lacking. A single device is used (to be fair, it’s a commonly used device) and as far as I can tell a single person recorded the keystrokes and was assessed. I don’t think it did a good job of simulating trying to train and create a model for someone via recorded audio from a medium such as zoom given many realistic variables like audio quality, being on or off mute, connection quality issues, mic sensitivity, etc. With that being said, it is exposing a theoretical attack vector and I think that’s important to identify and recognize.