Apparently, there are SO many ways to do this. If anyone is interested in this sort of thing, check out the papers made by Ben-Gurion University’s Cyber-Security Research Center. They discovered all kinds of methods which can be used to steal data, which are, but are not limited to:
using Keyboard LEDs
heat emanations
screen brightness
Seriously, it’s as insane as it is fascinating. They even know how to extract data through a Faraday cage. Their latest discovery seems to be this article and their previous ones can be found towards the bottom of the same page.
By listening to the sound of your typing - https://github.com/ggerganov/kbd-audio - although it works best/only with mechanical keyboards in a noise-free environment.
That said, and not to discount the possibility, but most of these techniques are generally impractical and tend to require mostly perfect conditions - like the source code linked above working with mechanical keyboards.
Apparently, there are SO many ways to do this. If anyone is interested in this sort of thing, check out the papers made by Ben-Gurion University’s Cyber-Security Research Center. They discovered all kinds of methods which can be used to steal data, which are, but are not limited to:
Seriously, it’s as insane as it is fascinating. They even know how to extract data through a Faraday cage. Their latest discovery seems to be this article and their previous ones can be found towards the bottom of the same page.
By listening to the sound of your typing - https://github.com/ggerganov/kbd-audio - although it works best/only with mechanical keyboards in a noise-free environment.
That said, and not to discount the possibility, but most of these techniques are generally impractical and tend to require mostly perfect conditions - like the source code linked above working with mechanical keyboards.
…for now