This AI tool can steal your data just by listening to what keys you press

Person writing on computer.
(Image credit: Glenn Carstens-Peters / Unsplash)

New research has revealed a novel way to steal sensitive information - by working out what a target has typed via the sound of key presses alone. 

A team at Cornell University has published a paper detailing their exploits, offering, in its words, "a practical implementation of a state-of-the-art deep learning model in order to classify laptop keystrokes, using a smartphone integrated microphone."

Dubbed acoustic side-channel attacks, the team noted the potential danger of this vector becoming a reality outside of a lab, given the prevalence of microphones in all sorts of devices and the rapid development of deep learning tools.

In the right key

First, the classifier had to be trained on a specific keyboard - in this case, the team used a MacBook Pro. They pressed 36 keys on the board 25 times each, and recorded the sound of these presses in two ways - once using a smartphone microphone, and the other using the video conferencing software Zoom.

The AI within the classifier, by discerning the minute differences in the waveforms produced by each keystroke, could then work out what key was pressed when in subsequent tests.

Both recording methods produced a high accuracy rate in these tests. For classifiers trained using the phone microphone, the accuracy rate for detecting keystrokes was 95%, and for those trained using Zoom it was 93%.

The researchers concede, however, that the classifier's accuracy can be undermined in certain ways, such as the user changing their typing technique. For instance, by touch typing, the accuracy rate drops to 40-64%. 

They also said that certain software could be used to add extra noise to keystrokes to mask their true sound and thus further weaken the classifier's effectiveness.

However, with mechanical keyboards, where the audibility of keystrokes is clear, the classifier works well. It is also effective with quieter membrane keyboards too, so should this proof-of-concept become a reality, using software to obscure typing sound would be the best way to avoid being exploited by such attacks.

TOPICS
Lewis Maddison
Reviews Writer

Lewis Maddison is a Reviews Writer for TechRadar. He previously worked as a Staff Writer for our business section, TechRadar Pro, where he had experience with productivity-enhancing hardware, ranging from keyboards to standing desks. His area of expertise lies in computer peripherals and audio hardware, having spent over a decade exploring the murky depths of both PC building and music production. He also revels in picking up on the finest details and niggles that ultimately make a big difference to the user experience.

Read more
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Hands typing on a keyboard surrounded by security icons
The psychology of scams: how cybercriminals are exploiting the human brain
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Voice cloning
I cloned my voice in seconds using a free AI app, and we really need to talk about speech synthesis
Phishing
Corporate executives are being increasingly targeted by AI phishing scams
DeepSeek
Experts warn DeepSeek is 11 times more dangerous than other AI chatbots
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)