Malicious app required to make “Pixnapping” attack work requires no permissions.

  •  Creat   ( @Creat@discuss.tchncs.de ) 
    link
    fedilink
    English
    arrow-up
    8
    ·
    2 个月前

    The attack seems similar to sidechannel attacks for CPUs, where you’d essentially read protected memory by observing side effects. Same idea but with pixels sent to the display.

  •  limerod   ( @limerod@reddthat.com ) 
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 个月前

    Here I thought not giving accessibility permission, draw over apps permission among others meant I was safe.

    Guess, there’s always something on the corner. More infuriating, this was disclosed in February and google has yet to completely fix the issue. I doubt I would be getting a proper fix any time sooner than march at this pace.

    •  limerod   ( @limerod@reddthat.com ) 
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 个月前

      Not all banks and website support physical key authentication. Besides, those keys can also be vulnerable. Yubikeys and others were vulnerable to a side channel attack and you had to buy new keys since you cannot patch hardware.

      The only saving grace was an Attacker needed physical access to attempt that. But, yes in general can be more secure.

      •  Nora   ( @crazyminner@lemmy.ml ) 
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 个月前

        Keys can generate TOTP codes that most if not all services that support 2FA/MFA use.

        You just scan the QR or enter the code with the key plugged in and it adds it.