Researchers have discovered a way to steal PINs using Google Glass

TECHi's Author Lorie Wimble
Opposing Author Wired Read Source Article
Last Updated
TECHi's Take
Lorie Wimble
Lorie Wimble
  • Words 142
  • Estimated Read 1 min

Researchers at the University of Massachusetts Lowell have demonstrated an interesting technique for using Google Glass to detect phone PINs with 83% accuracy from across a room, even when the screen wasn’t visible. The technique used applies an image-recognition algorithm that doesn’t need direct sight of the screen. Instead, it uses a reference image of the target device to detect the angle at which it’s being held, then tracks the shadows from finger taps to detect which on-screen keys are being pressed. “I think of this as a kind of alert about Google Glass, smartwatches, all these devices,” says Xinwen Fu, a computer science professor at UMass Lowell who plans to present the findings with his students at the Black Hat security conference in August. “If someone can take a video of you typing on the screen, you lose everything.”

Wired

Wired

  • Words 265
  • Estimated Read 2 min
Read Article

The odds are you can’t make out the PIN of that guy with the sun glaring obliquely off his iPad’s screen across the coffee shop. But if he’s wearing Google Glass or a smartwatch, he probably can see yours. Researchers at the University of Massachusetts Lowell found they could use video from wearables like Google Glass and the Samsung smartwatch to surreptitiously pick up four-digit PIN codes typed onto an iPad from almost 10 feet away—and from nearly 150 feet with a high-def camcorder. Their software, which used a custom-coded video recognition algorithm that tracks the shadows from finger taps, could spot the codes even when the video didn’t capture any images on the target devices’ displays. “I think of this as a kind of alert about Google Glass, smartwatches, all these devices,” says Xinwen Fu, a computer science professor at UMass Lowell who plans to present the findings with his students at the Black Hat security conference in August. “If someone can take a video of you typing on the screen, you lose everything.” Fu and his students tested a variety of video-enabled devices including Glass, an iPhone 5 camera, and a $72 Logitech webcam. They used Glass to spot a four-digit PIN from three meters away with 83 percent accuracy—and greater than 90 percent with some manual correction of errors. Webcam video revealed the code 92 percent of the time. And the iPhone’s sharper camera caught the code in every case. The researchers have tested the Samsung smartwatch just a few times, but it caught the target PIN about as often as Glass.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Wired

The North Korean IT Workers Stole more than 80 American Identities
The North Korean IT Workers Stole more than 80 American Identities

In this hyper-connected world, stealing someone's identity is not just cybercrime; it’s now becoming a source of profit and power.…

Here’s how to use Spotify to its full potential
Here’s how to use Spotify to its full potential

Spotify is pretty much a must-have for anyone who even remotely enjoys music, which is basically everyone, but even those…

This is Samsung’s answer to the iPad Pro and Surface Pro 4
This is Samsung’s answer to the iPad Pro and Surface Pro 4

Productivity-focused tablets are breathing new life into a market that's been on the decline for a while now, and Samsung…

Zerodium just awarded hackers a million bucks for breaking into iOS 9
Zerodium just awarded hackers a million bucks for breaking into iOS 9

Zerodium is an interesting company. It makes its money by purchasing exploits and security information regarding popular software, and then…