JOURNAL ARTICLE

Acoustic Eavesdropping: How AIs Can Steal Your Secrets by Listening to Your Typing

A.Shaji GeorgeS.Sagayarajan

Year: 2023 Journal:   Zenodo (CERN European Organization for Nuclear Research)   Publisher: European Organization for Nuclear Research

Abstract

Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberattack - acoustic side channel attacks, where AIs can identify keystrokes and steal passwords simply by listening to the sounds of typing. A study published in 2021 demonstrated this is possible with 93% accuracy using common video conferencing apps like Zoom. By analyzing audio recordings, AIs can detect the precise timings between keystrokes, and map patterns to reveal what is being typed. This poses serious risks, as acoustic eavesdropping can steal passwords, private messages, credit card numbers and other sensitive information. This paper examines the technical details of how acoustic side channel attacks work, using machine learning algorithms to match audio signals to keystroke inputs. It outlines real-world examples of AIs stealing credentials, text messages, and financial data simply by listening to typing sounds. The paper then discusses the broader dangers of acoustic snooping attacks, which exploit ubiquitous apps like video calls to turn devices into surveillance bugs. With acoustic attacks operating silently in the background, users may have their most confidential information extracted without their knowledge. To defend against this novel threat, the paper provides recommendations like using strong randomized passwords, enabling two-factor authentication, and avoiding typing sensitive information during video calls in public spaces. It also explores emerging countermeasures like audio masking, localized jamming signals, and AI detection of acoustic anomalies. However, these defenses are still in early stages. The paper concludes with an outlook on the future of acoustic security, emphasizing the need for continued research and increased user awareness to combat the disturbing privacy risks posed by AI listening hacks.

Keywords:
Eavesdropping Active listening Computer security Typing Computer science Internet privacy Psychology Speech recognition Communication

Metrics

2
Cited By
1.24
FWCI (Field Weighted Citation Impact)
0
Refs
0.80
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Acoustic Eavesdropping: How AIs Can Steal Your Secrets by Listening to Your Typing

George, A.ShajiS.Sagayarajan

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2023
BOOK-CHAPTER

Steal Your Face

UNP - Nebraska eBooks Year: 2018 Pages: 21-26
JOURNAL ARTICLE

Why Did Your Priest Steal Your Money?

Ray JonesThomas J. Zagenczyk

Journal:   Proceedings of the International Association for Business and Society Year: 2000 Vol: 11 Pages: 453-462
JOURNAL ARTICLE

They'll steal your vote

Jack Harrison Pollack

Journal:   National Municipal Review Year: 1956 Vol: 45 (7)Pages: 322-327
JOURNAL ARTICLE

Do Your Students Steal?

Gunder A. Myran

Journal:   The Journal of Business Education Year: 1965 Vol: 40 (6)Pages: 241-242
© 2026 ScienceGate Book Chapters — All rights reserved.