The paper notes that these types of attacks can be carried out with off-the-shelf equipment and algorithms.

    • Pons_Aelius@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      1 year ago

      True. But who would read a story with the headline:

      “Research team create learning model with zero real world applications.”

      The paper notes that while completely useless, it can be done with off the shelf equipment…but it is still cheaper and actually effective to use a $10 keylogger.

      • CIWS-30@kbin.social
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        I’d read that. Because the honest title, and I’d be curious as to why they’re doing it, and if there might be a niche way to actually make it worth it one day.