Malicious app required to make “Pixnapping” attack work requires no permissions.

  • Creat@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    12
    ·
    2 days ago

    The attack seems similar to sidechannel attacks for CPUs, where you’d essentially read protected memory by observing side effects. Same idea but with pixels sent to the display.

  • limerod@reddthat.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    24 hours ago

    Here I thought not giving accessibility permission, draw over apps permission among others meant I was safe.

    Guess, there’s always something on the corner. More infuriating, this was disclosed in February and google has yet to completely fix the issue. I doubt I would be getting a proper fix any time sooner than march at this pace.

  • FishFace@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    Interesting. I wonder what it is that causes the render times to be different and how much noise there is. Maybe the solution will be to worsen timer accuracy!

  • Nora@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 day ago

    Not ones that use keys. Just shut off your data and wifi then plug in the key and get the code and then remove the key and you’re good to go.

    • limerod@reddthat.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 day ago

      Not all banks and website support physical key authentication. Besides, those keys can also be vulnerable. Yubikeys and others were vulnerable to a side channel attack and you had to buy new keys since you cannot patch hardware.

      The only saving grace was an Attacker needed physical access to attempt that. But, yes in general can be more secure.

      • Nora@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Keys can generate TOTP codes that most if not all services that support 2FA/MFA use.

        You just scan the QR or enter the code with the key plugged in and it adds it.

    • BrikoX@lemmy.zipOPM
      link
      fedilink
      English
      arrow-up
      27
      ·
      edit-2
      2 days ago

      Except attack “requires no permissions” for the app to work.

    • XLE@piefed.social
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      3
      ·
      2 days ago

      The article is pretty clear that the issue is with the Android devices themselves, not with lazy users. There is no indication that a malicious app has these permissions.