Baughn comments on Open thread for December 17-23, 2013 - Less Wrong
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (301)
If the attacker can run code on your device, a keylogger is a much simpler solution.
Not if it's sandboxed, but then timing and other side-channel attacks are still easier than using the mike.