Orbi Camp
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
vegeta@lemmy.world to Technology@lemmy.worldEnglish · 2 days ago

Hackers can steal 2FA codes and private messages from Android phones

arstechnica.com

external-link
message-square
49
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
219
external-link

Hackers can steal 2FA codes and private messages from Android phones

arstechnica.com

vegeta@lemmy.world to Technology@lemmy.worldEnglish · 2 days ago
message-square
49
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
Malicious app required to make “Pixnapping” attack work requires no permissions.
  • mfed1122@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    55
    ·
    2 days ago

    "Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”

    This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.

    • EndlessNightmare@reddthat.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      24 hours ago

      Would color text on color background foil this? Red text on a green background, etc

      • mfed1122@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        3
        ·
        23 hours ago

        Not sure. Google patched it by just limiting the amount of blurs an app could request: https://android.googlesource.com/platform/frameworks/native/+/20465375a1d0cb71cdb891235a9f8a3fba31dbf6

    • Aceticon@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      19 hours ago

      Reminds me how in the early days the secret keys inside the smartchips in things like bank cards could be extracted by measuring the power consumption when the smartchips were doing things like signing data using those keys.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @[email protected]
  • @[email protected]
  • @[email protected]
  • @[email protected]
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 2.7K users / day
  • 8.67K users / week
  • 14.8K users / month
  • 34.1K users / 6 months
  • 1 local subscriber
  • 76K subscribers
  • 6.16K Posts
  • 184K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • L3s@hackingne.ws
  • L4s@hackingne.ws
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org