social@p80.se
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
vegeta@lemmy.world to Technology@lemmy.worldEnglish · 1 day ago

Hackers can steal 2FA codes and private messages from Android phones

arstechnica.com

external-link
message-square
47
fedilink
  • cross-posted to:
  • android@lemdro.id
200
external-link

Hackers can steal 2FA codes and private messages from Android phones

arstechnica.com

vegeta@lemmy.world to Technology@lemmy.worldEnglish · 1 day ago
message-square
47
fedilink
  • cross-posted to:
  • android@lemdro.id
Malicious app required to make “Pixnapping” attack work requires no permissions.
  • mfed1122@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    54
    ·
    1 day ago

    "Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”

    This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.

    • EndlessNightmare@reddthat.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 hours ago

      Would color text on color background foil this? Red text on a green background, etc

      • mfed1122@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 hours ago

        Not sure. Google patched it by just limiting the amount of blurs an app could request: https://android.googlesource.com/platform/frameworks/native/+/20465375a1d0cb71cdb891235a9f8a3fba31dbf6

    • Aceticon@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      6
      ·
      15 hours ago

      Reminds me how in the early days the secret keys inside the smartchips in things like bank cards could be extracted by measuring the power consumption were the smartchips were doing things like signing data using those keys.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 3.92K users / day
  • 8.94K users / week
  • 14.5K users / month
  • 34.1K users / 6 months
  • 1 local subscriber
  • 76K subscribers
  • 4.65K Posts
  • 127K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • L4sBot@lemmy.world
  • Technopagan@lemmy.world
  • L3s@hackingne.ws
  • L4s@hackingne.ws
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org