Close Menu
Ztoog
    What's Hot
    Crypto

    Bitcoin ETF Netflows May Experience Rebound If This Price Is Attained, Analyst Explains

    The Future

    Farizon, Geely’s truck unit, raised $600M to expand outside China

    Gadgets

    Save 20% on a lifetime of documentaries with Curiosity Stream

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      Can work-life balance tracking improve well-being?

      Any wall can be turned into a camera to see around corners

      JD Vance and President Trump’s Sons Hype Bitcoin at Las Vegas Conference

      AI may already be shrinking entry-level jobs in tech, new research suggests

      Today’s NYT Strands Hints, Answer and Help for May 26 #449

    • Technology

      Elon Musk tries to stick to spaceships

      A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

      Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

      Apple iPhone exports from China to the US fall 76% as India output surges

      Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

    • Gadgets

      Future-proof your career by mastering AI skills for just $20

      8 Best Vegan Meal Delivery Services and Kits (2025), Tested and Reviewed

      Google Home is getting deeper Gemini integration and a new widget

      Google Announces AI Ultra Subscription Plan With Premium Features

      Google shows off Android XR-based glasses, announces Warby Parker team-up

    • Mobile

      Deals: the Galaxy S25 series comes with a free tablet, Google Pixels heavily discounted

      Microsoft is done being subtle – this new tool screams “upgrade now”

      Wallpaper Wednesday: Android wallpapers 2025-05-28

      Google can make smart glasses accessible with Warby Parker, Gentle Monster deals

      vivo T4 Ultra specs leak

    • Science

      June skygazing: A strawberry moon, the summer solstice… and Asteroid Day!

      Analysts Say Trump Trade Wars Would Harm the Entire US Energy Sector, From Oil to Solar

      Do we have free will? Quantum experiments may soon reveal the answer

      Was Planet Nine exiled from the solar system as a baby?

      How farmers can help rescue water-loving birds

    • AI

      Rationale engineering generates a compact new tool for gene therapy | Ztoog

      The AI Hype Index: College students are hooked on ChatGPT

      Learning how to predict rare kinds of failures | Ztoog

      Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time

      AI learns how vision and sound are connected, without human intervention | Ztoog

    • Crypto

      Bitcoin Maxi Isn’t Buying Hype Around New Crypto Holding Firms

      GameStop bought $500 million of bitcoin

      CoinW Teams Up with Superteam Europe to Conclude Solana Hackathon and Accelerate Web3 Innovation in Europe

      Ethereum Net Flows Turn Negative As Bulls Push For $3,500

      Bitcoin’s Power Compared To Nuclear Reactor By Brazilian Business Leader

    Ztoog
    Home » Phone Keyboard Exploits Leave 1 Billion Users Exposed
    Technology

    Phone Keyboard Exploits Leave 1 Billion Users Exposed

    Facebook Twitter Pinterest WhatsApp
    Phone Keyboard Exploits Leave 1 Billion Users Exposed
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Digital Chinese-language keyboards which might be weak to spying and eavesdropping have been utilized by 1 billion smartphone customers, in response to a brand new report. The widespread threats these leaky programs reveal might additionally current a regarding new sort of exploit for cyberattacks, whether or not the system makes use of a Chinese-language keyboard, an English keyboard, or every other.

    Last yr, the University of Toronto’s Citizen Lab launched a research of a proprietary Chinese keyboard system owned by the Shenzhen-based tech large Tencent. Citizen Lab’s “Sogou Keyboard” report uncovered the widespread vary of assaults potential on the keyboard, which might leak a consumer’s key presses to outdoors eavesdroppers. Now, within the group’s new research, launched final week, the identical researchers have found that primarily all of the world’s fashionable Chinese smartphone keyboards have suffered related vulnerabilities.

    “Whatever Chinese-language users of your app might have typed into it has been exposed for years.” —Jedidiah Crandall, Arizona State University

    And whereas the precise bugs the 2 studies have uncovered have been mounted in most cases, the researchers’ findings—and particularly, their suggestions—level to considerably bigger gaps within the programs that reach into software program developed world wide, irrespective of the language.

    “All of these keyboards were also using custom network protocols,” says Mona Wang, a pc science Ph.D. scholar at Princeton University and coauthor of the report. “Because I had studied these sort of custom network protocols before, then this immediately screamed to me that there was something really terrible going on.”

    Jedidiah Crandall, an affiliate professor of computing and augmented intelligence at Arizona State University in Tempe, who was consulted within the report’s preparation however was not on the analysis crew, says these vulnerabilities matter for almost any coder or improvement crew that releases their work to the world. “If you are a developer of a privacy-focused chat app or an app for tracking something health related, whatever Chinese language users of your app might have typed into it has been exposed for years,” he says.

    The Chinese keyboard drawback

    Chinese, a language of tens of hundreds of characters with some 4,000 or extra in widespread use, represents a definite problem for keyboard enter. A variety of various keyboard programs have been developed within the digital period—generally referred to as pinyin keyboards, named after a preferred romanization system for traditional Chinese. Ideally, these artistic approaches to digital enter allow a profoundly advanced language to be straightforwardly phoneticized and transliterated by way of a compact, typically QWERTY-style keyboard format.

    “Even competent and well-resourced people get encryption wrong, because it’s really hard to do correctly.” —Mona Wang, Princeton University

    Computational and AI smarts may help rework key presses into Chinese characters on the display screen. But Chinese keyboards typically contain many interchanges throughout the Internet between cloud servers and different assistive networked apps, simply to make it potential for a Chinese-speaking particular person to have the ability to kind the characters.

    According to the report—and an FAQ the researchers launched explaining the technical factors in plain language—the Chinese keyboards studied all used character-prediction options, which in flip relied on cloud-computing assets. The researchers discovered that improperly secured communications between a tool’s keyboard app and people exterior cloud servers meant that customers’ keystrokes (and due to this fact their messages) might be accessed in transit.

    Jeffrey Knockel, a senior analysis affiliate at Citizen Lab and the report coauthor, says cloud-based character prediction is a very enticing characteristic for Chinese-language keyboards, given the huge array of potential characters that any given QWERTY keystroke sequence could be trying to characterize. “If you’re typing in English or any language where there’s enough keys on a keyboard for all your letters, that’s already a much simpler task to design a keyboard around than an ideographic language where you might have over 10,000 characters,” he says.

    (*1*)Chinese-language keyboards are sometimes “pinyin keyboards,” which permit for hundreds of characters to be typed utilizing a QWERTY-style method.Zamoeux/Wikimedia

    Sarah Scheffler, a postdoctoral affiliate at MIT, expressed concern additionally about different kinds of knowledge vulnerabilities that the Citizen Lab report reveals—past keyboards and Chinese-language particular purposes essentially. “The vulnerabilities [identified by the report] are not at all specific to pinyin keyboards,” she says. “It applies to any application sending data over the Internet. Any app sending unencrypted—or badly encrypted—information would have similar issues.”

    Wang says the chief drawback the researchers uncovered issues the truth that so many Chinese-keyboard protocols transmit knowledge utilizing inferior and generally custom-made encryption.

    “These encryption protocols are probably developed by very, very competent and very well-resourced people,” Wang says. “But even competent and well-resourced people get encryption wrong, because it’s really hard to do correctly.”

    Beyond the vulnerabilities uncovered

    Scheffler factors to the two-decades-long testing, iteration, and improvement of the transport layer safety (TLS) system underlying a lot of the Internet’s safe communications, together with web sites that use the Hypertext Transfer Protocol Secure (HTTPS) protocol. (The first model of TLS was specified and launched in 1999.) “All these Chinese Internet companies who are rolling their own [cryptography] or using their own encryption algorithms are sort of missing out on all those 20 years of standard encryption development,” Wang says.

    Crandall says the report might have additionally inadvertently highlighted assumptions about safety protocols that won’t at all times apply in each nook of the globe. “Protocols like TLS sometimes make assumptions that don’t suit the needs of developers in certain parts of the world,” he says. For occasion, he provides, custom-made, non-TLS safety programs could also be extra enticing “where the network delay is high or where people may spend large amounts of time in areas where the network is not accessible.”

    Scheffler says the Chinese-language keyboard drawback might even characterize a sort of canary within the coal mine for a variety of laptop, smartphone, and software program programs. Because of their reliance on intensive Internet communications, such programs—whereas maybe missed or relegated to the background by builders—additionally nonetheless characterize potential cybersecurity assault surfaces.

    “Anecdotally, a lot of these security failures arise from groups that don’t think they’re doing anything that requires security or don’t have much security expertise,” Scheffler says.

    Scheffler identifies “Internet-based predictive-text keyboards in any language, and maybe some of the Internet-based AI features that have crept into apps over the years” as potential locations concealing cybersecurity vulnerabilities related to people who the Citizen Lab crew found in Chinese-language keyboards. This class might embody voice recognition, speech-to-text, text-to-speech, and generative AI instruments, she provides.

    “Security and privacy isn’t many people’s first thought when they’re building their cool image-editing application,” says Scheffler. ”Maybe it shouldn’t be the primary thought, nevertheless it ought to positively be a thought by the point the appliance makes it to customers.”

    This story was up to date 29 April 2024.

    From Your Site Articles

    Related Articles Around the Web

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    Elon Musk tries to stick to spaceships

    Technology

    A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

    Technology

    Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

    Technology

    Apple iPhone exports from China to the US fall 76% as India output surges

    Technology

    Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

    Technology

    5 Skills Kids (and Adults) Need in an AI World – O’Reilly

    Technology

    How To Come Back After A Layoff

    Technology

    Are Democrats fumbling a golden opportunity?

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Mobile

    Google TV on Android just got this YouTube feature to help you choose your next show (APK teardown)

    Edgar Cervantes / Android AuthorityTL;DR Google has began rolling out AI summaries and opinions on…

    The Future

    The (Cleaning) Droid You’re Looking for – Review Geek

    Rating: 8/10 ? 1 – Absolute Hot Garbage 2 – Sorta Lukewarm Garbage 3 -…

    The Future

    Belkin’s 3-in-1 charger with MagSafe has fallen to an all-time low

    To this present day, Belkin’s BoostCharge Pro stays our favourite MagSafe 3-in-1 stand for residence…

    Mobile

    iOS 18 beta 2 is out, iPadOS 18 beta 2 brings support for alternative app stores in the EU

    Apple launched the first betas of iOS 18 and iPadOS 18 earlier this month throughout…

    Mobile

    Pixel phones get jazzier with Kenny G-like ringtone

    Ryan Haines / Android AuthorityTL;DR Google has up to date the Sounds app after launching…

    Our Picks
    Mobile

    Last chance to get a deal from Samsung Week in the US

    Technology

    NSA launches AI security center amid growing cyber threats

    Science

    ‘This century is special’: Astronomer Royal Martin Rees on the vast span of time

    Categories
    • AI (1,493)
    • Crypto (1,754)
    • Gadgets (1,805)
    • Mobile (1,851)
    • Science (1,867)
    • Technology (1,803)
    • The Future (1,649)
    Most Popular
    The Future

    The Real Reason Bloody Marys Tastes so Good on an Airplane

    Mobile

    Apple iPhone 15 Pro Max vs iPhone 14 Pro Max: expected differences

    Science

    Scientists map the brain on mind-altering drugs

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.