Machine Learning Approach to Guess Passwords via Microphones
Most of the known attacks involve some kind of software in the victim’s device that can be exploited, or it’s a trojan by itself that can be controlled remotely. But what if attackers can get the victim’s sensitive data like passwords over the phone without the need to install any software?