Eh... if an attacker has the level of physical access to the CPU that's required to plant a microphone, you have worse problems than acoustic attacks.
In the example the used a mobile phone. Going from having owned a microphone to being able to know a key on a computer is a significant step.
Additionally there are other way to get audio access. Heating pipes conduct sound waves if the attacker has a good microphone.
Glass of windows vibrates in a way that can be detected from a distance.
If it's worth saying, but not worth its own post (even in Discussion), then it goes here.