LWN: Comments on "Nocera: iio-sensor-proxy 1.0 is out!" https://lwn.net/Articles/645664/ This is a special feed containing comments posted to the individual LWN article titled "Nocera: iio-sensor-proxy 1.0 is out!". en-us Wed, 01 Oct 2025 01:06:58 +0000 Wed, 01 Oct 2025 01:06:58 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net keyboard sniffing https://lwn.net/Articles/647144/ https://lwn.net/Articles/647144/ robbe <div class="FormattedComment"> That one is easy: only give (real) accelerometer readings to an application/browser frame/UI element that has the keyboard focus. If you generalise "keyboard focus" to "input focus" it makes even more sense.<br> <p> Other attacks, like the one determining your location in a train system by the experienced jumps and bumps, are harder to mitigate.<br> </div> Wed, 03 Jun 2015 20:26:45 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645867/ https://lwn.net/Articles/645867/ ssam <div class="FormattedComment"> If the acceleration is exposed to javascript in your browser and is sensitive enough to give you the timing on keystrokes ( <a href="http://it.slashdot.org/story/05/09/13/1644259/keyboard-sound-aids-password-cracking">http://it.slashdot.org/story/05/09/13/1644259/keyboard-so...</a> ), then you have a problem.<br> </div> Tue, 26 May 2015 14:03:41 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645856/ https://lwn.net/Articles/645856/ andreasn1 <div class="FormattedComment"> Isn't it easier for it to ask X directly for that?<br> </div> Tue, 26 May 2015 11:08:38 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645842/ https://lwn.net/Articles/645842/ dlang <div class="FormattedComment"> And if the attacker is good enough to get this sort of software on the system, why can't they just read the keystrokes directly?<br> </div> Tue, 26 May 2015 00:18:43 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645774/ https://lwn.net/Articles/645774/ mrjk <div class="FormattedComment"> I am not seeing how this product would make you more vulnerable than before? If an attacker is sophisticated enough to decipher accelerometer readings to get keystrokes, and good enough to get software on a laptop to intercept those readings, aren't they good enough to get software on the laptop to read the accelerometer itself?<br> <p> I guess this could make it easier for less sophisticated to make attacks, but this seems so high level in practice that you are at the professional level. I would expect any kit that could do the movement translation would include software to read the sensor if it was not present, either through this new subsystem or just direct read. I don't know why they wouldn't just insert a keystroke logger if they have that access.<br> <p> </div> Mon, 25 May 2015 03:43:55 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645755/ https://lwn.net/Articles/645755/ dashesy <div class="FormattedComment"> Yes, you can detect shocks/taps. Hard part is to distinguish a shock from another. First, you need a sensor that is not too noisy in that band, then either you have to have a high sample rate and then look for its profile, or rely on the internal sample rate of the chip and set up an interrupt for different tap events, while using lower rate for capture. The event approach will not be very useful though to detect *which* key is pressed (unless keys too far off do not register any event but closer ones do), the former can for example take into account the distance of a key to accel chip and use max amplitude (after some polynomial fitting to fix clipping). A better model should take all 3 axes and look at them individually (as 3 springs taking a shock), and solving wave equations to distinguish different keys on the same radius.<br> </div> Sun, 24 May 2015 17:24:31 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645754/ https://lwn.net/Articles/645754/ paulj <div class="FormattedComment"> I've only tinkered with accelerometers, but it seemed to me the little 'shocks' from tapping a device could be seen in the accelerometer signals - least by eyeball.<br> </div> Sun, 24 May 2015 16:57:31 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645721/ https://lwn.net/Articles/645721/ dashesy <div class="FormattedComment"> I agreed there is information, I use accel to detect activities after all [1], and with precise enough accel sensors we can read heart-rate too. However the setup in [2] uses smart phones but the article is about laptops. Different scale matters when it comes to acceleration (besides the fact that a major application of accel on phones is for games which need good sensors). While accel sensors perform well to detect orientation (stable state), detecting temporal changes in accel readings require high sample rate because you cannot keep it *accelerating* for long when displacement is short (think about taps-scale and it becomes more chaotic). If entering passwords we were tilting the keyboard, the way we do with pins on a phone they could be compared. Again, I agreed, you are right, with enough time, high enough sample-rate, on many devices the error will average out and you get some bits of information (interesting enough to write a paper and work for some 3-letter organization).<br> <p> <p> [1] &lt;<a href="https://www.amiigo.com">https://www.amiigo.com</a>&gt;<br> [2] &lt;<a href="https://www.schneier.com/blog/archives/2013/02/guessing_smart.html">https://www.schneier.com/blog/archives/2013/02/guessing_s...</a>&gt;<br> </div> Sat, 23 May 2015 17:22:30 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645703/ https://lwn.net/Articles/645703/ oldtomas <div class="FormattedComment"> To put Wahern's statement in other words: if you communicate slowly enough through your channel [1] (in Wahern's words: if you get enough attempts at it) you can compensate for any noise level (assuming the noise is uncorrelated to the signal). So yes, you can inch your way towards the password a fraction of a bit at a time. And a related attack has been demonstrated already [2]<br> <p> [1] &lt;<a rel="nofollow" href="https://en.wikipedia.org/wiki/Noisy-channel_coding_theorem">https://en.wikipedia.org/wiki/Noisy-channel_coding_theorem</a>&gt;<br> [2] &lt;<a rel="nofollow" href="https://www.schneier.com/blog/archives/2013/02/guessing_smart.html">https://www.schneier.com/blog/archives/2013/02/guessing_s...</a>&gt;<br> </div> Sat, 23 May 2015 12:48:04 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645687/ https://lwn.net/Articles/645687/ dashesy <div class="FormattedComment"> If lets say accelerometer chip has 14 bits (+2 bits of noise), having 1.1mg/LSB is normal, they can be used to detect taps or double taps (with varying degree of success depending on sensor). This is not same as microphones, that after all have to be accurate or our ears will detect the smallest glitches. The original purpose of these accel chips is for manufacturers to detect a free fall, to void warranty. But yes you could be right, with high enough sample rate and capturing enough data.<br> </div> Sat, 23 May 2015 02:45:02 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645686/ https://lwn.net/Articles/645686/ wahern <div class="FormattedComment"> Care to provide a rigorous elaboration and proof of that assertion?<br> <p> The accuracy and precision necessary to provide a consistent user experience are far stronger than what can be useful to a password sniffing scheme. The past decade has seen tremendous advancements in side-channel attacks, and particularly the ability to derive useful bits from system noise. Maybe you can't deduce the password from a single input session, but 10? 100? 1000?<br> <p> Basically, if you can't provide a proof of security--at a minimum, proof of constraints that can be usefully applied to gauge security--it's best to either assume it's possible, or at the very least abstain from asserting that it's impossible or probably impossible.<br> <p> <p> </div> Sat, 23 May 2015 02:01:34 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645673/ https://lwn.net/Articles/645673/ dashesy <div class="FormattedComment"> It depends on the accelerometer sensor precision, if the key strokes fall below noise level then no amount of cleverness would suffice.<br> </div> Fri, 22 May 2015 23:06:02 +0000 Nocera: iio-sensor-proxy 1.0 is out! https://lwn.net/Articles/645669/ https://lwn.net/Articles/645669/ josh <div class="FormattedComment"> For anyone wondering about the security issues with raw accelerometer readings: a sufficiently clever application could use accelerometer readings to get a pretty good idea about what the user typed. At the very least, that can provide enough information to drastically reduce the number of guesses required to get someone's password or passphrase.<br> </div> Fri, 22 May 2015 22:38:55 +0000