We are used to talking, writing and reading about the alleged security issues in Android, on responsibility fee that smartphone manufacturers have in these vulnerabilities, the amount and aggressiveness of malware but ...What happens when your own mobile serves as a Trojan Horse for friends of others? According to a study by a team from the University of Cambridge, It is relatively easy to obtain the PIN code from a smartphone using a program that uses the camera and the microphone from the device to get the digits.
The illustrious software is called Skimmer PIN and its clever developers gave it the ability to observe and identify the facial gestures and user's gaze using the smartphone's front camera, while also using the microphone to 'listen' to the keystrokes of the different digits entered by the user. In this way, the information obtained is cross-referenced to calculate the phone orientation and approximate location of the button pressed, achieving a worrying success rate with simple or low-digit PIN codes.
More than 50 percent correct to five attempts on four-digit PIN codes
Professor of Safety Engineering at the aforementioned British university, Ross Anderson, highlighted that the first thing that surprised them when carrying out the study was “how well it worked" Skimmer PIN when it comes to finding the PIN codes of the different phones used as 'guinea pigs'. It should be noted that the models with which the study was carried out were Samsung Galaxy S3 y Nexus S, although the method may recalibrate for other terminals and systems.
In them the success rate was greater than 50 percent For four-digit PIN codes, the success rate was up to five attempts, while for eight-digit PIN codes, the success rate was up to 10 attempts. 60 percent. Other independent tests show that, with 50 different codes, the system managed to guess more than 30% in solo two tries, exceeding half to five attempts for 4-digit PIN, and about a 45% an 8-digit PIN with five attempts. Variations depend on the microphone quality, lighting, ambient noise and the keyboard model onscreen.

How exactly does it do this? The app calculates the mobile position analyzing the face and the direction of the gaze with the front camera; in parallel, it identifies the taps of your fingers on the screen with the microphone, which captures subtle differences in sound between keys. correlate both signals with the numeric keypad pattern, infers which digit has been pressed. This approach explains why it is less effective with methods that do not produce discrete touches (such as pattern unlock by dragging your finger) or when the keyboard changes its provision randomly.
Researchers underline a key point: on a modern smartphone, all the sensors They are connected to the system and many apps can activate them in background if they have been granted permissions. This allows malware to observe without raising suspicion, especially if the user has granted permission to the camera and microphone for a seemingly legitimate reason (video calls, filters, voice notes).
Both Anderson and the study's other co-author, Lawrence Simon, they explained that the front camera, "which is generally used for video calls or facial recognition, can also be used maliciously." As for the microphone, the aforementioned software uses it to capture the user's keystrokes on the smartphone's virtual keyboard. Therefore, according to the researchers, "you can see the changes and movements of the face as they type on the phone” and are “correlated with the position of the digit pressed by the user.”
As a method to avoid the dangers derived from a hypothetical expansion of more programs similar to this one Skimmer PIN, the authors of the study recommend the use of Longer PINs and random assignment of the same, although they admit that such extremes would affect the "ease of use" and could even "paralyze the usability" of the devices. As more drastic solutions, although no less valid, they also advocate the complete elimination of written passwords and their replacement by the use of fingerprint or facial recognition. In addition, it is recommended that sensitive apps (for example, Bank) actively block the sensors that they do not need during credential entry, and that manufacturers incorporate measures such as numeric keypads with random order, safe areas or isolated profiles where the sensors are limited while typing.
It is also advisable to review the permits granted and revoke camera and microphone access to apps that do not require it, maintain the system updated, use two step authentication when available, and take advantage of system features that dim or block other apps from viewing the screen during login. PINIn corporate environments, the use of containers or work profiles helps segregate both data and sensors into critical tasks.
Source: BBC Vía: uberismTo optimize it, you should avoid making references to a specific year for make the content as evergreen as possibleIn addition, I'm going to give you a list of several JSONs from the competitor websites that rank best on Google for the term "get mobile camera microphone PIN" and their content:
PIN Skimmer It is the method of a group of researchers at the University of Cambridge to decipher security codes using a mobile phone's camera and microphone.
Passwords and PINs are the gateway to all our data and identities.Someone with that information has the power to even impersonate us if they so desire. That's why it's important to use strong passwords. However, a group of researchers at the University of Cambridge managed to find a method that even the most secure passwords and PINs couldn't protect our information. The method is called PIN Skimmer, and it involves deciphering security codes through our smartphone's camera and microphone using an app.
Although smartphone security has been constantly optimized over the last few years, and even having two different operating systems on the same phone to protect sensitive applications has been considered, it has not been taken into account that All the sensors on a smartphone are connected to each otherFurthermore, all of these sensors can be activated through software that could be running right on the operating system itself. This is the PIN Skimmer feature, an application that uses the phone's camera and microphone to detect the code or password being entered into a system.
This method for obtaining passwords was discovered by a group of researchers at the University of Cambridge who published their results online. It turns out that with a PIN Skimmer installed on any smartphone, researchers can activate the microphone and camera of the device at the moment the user enters the code. By recording the audio, they can detect the keys that the user is pressing thanks to its sound and in combination with the image of the user recorded with the front camera. Simply because we all watch the keys we press at the moment we do so. Once you have the password and/or PIN, you can use this data.
PIN Skimmer is an application that emulates what would happen, but It is an example that it is possible to obtain passwords in this way.But how effective is this method? In tests with 50 four-digit PIN codes, the Skimmer managed to guess more than 30% of them in two attempts and more than half in five attempts. This could be resolved with longer PINs; but even with eight-digit PIN codes, the Skimmer managed to guess 45% of them in five attempts.
This data should be worrying for app developers for banks and other services. The creators of PIN Skimmer suggest that the best way to prevent this type of scam is to create apps that block sensors that aren't currently being used. However, it may be a good opportunity to change PINs as identification methods and use another method, such as fingerprints or another secondary device, for identification, such as a smartwatch.
We are used to talking, writing and reading about the alleged security problems in Android, about the share of responsibility that smartphone manufacturers have in these vulnerabilities, the quantity and aggressiveness of malware but... What happens when your own mobile phone serves as a Troy Horse For thieves? According to a study conducted by a team at the University of Cambridge, it's relatively easy to obtain a smartphone's PIN code using a program that uses the device's camera and microphone to extract the digits.
The famous software is called PIN Skimmer, and its clever developers have equipped it with the ability to observe and identify the user's facial expressions and gaze using the smartphone's front-facing camera, while also using the smartphone's microphone to "listen" to the user's keystrokes. This combines the information obtained to calculate the phone's orientation and the approximate location of the button pressed, achieving a worrying success rate for simple or low-digit PIN codes.
READ MORE: https: //androidayuda.com/2013/11/11/can-you-get-a-mobile-pin-using-the-camera-and-microphone/
Cl@ve offers a system of video identification registration, which allows citizens to register remotely, without the need to travel and with complete security guarantees.Temporarily, video identification registration will only be offered to Spanish citizens with a valid ID.. You only need:
1. Download the Cl@ve app here.
2. Follow the instructions in the application.
3. Register in a few minutes without having to travel.
The procedure is very simple and once completed, you obtain the basic registration level, which allows you to access a large number of government services:
- Comfortable: without travel, from home or anywhere
- Quick: register in a few minutes
- Segura: guarantee of verification and integrity of data
- Accessible: available from any mobile device
Conditions that the citizen must meet to initiate video identification
The video identification process must be carried out by the person holding the document, meeting the following conditions:
- Before starting the process:
- Have a valid ID.
- Have the Cl@ve APP installed.
- A mobile phone with a good connection, camera and microphone.
- An email address and a personal phone number.
- A quiet, well-lit place with a neutral background.
- During the process:
- The application will guide the citizen step by step.
- A video will be recorded showing the ID (front and back) and the full face.
- If the process is correct, the basic level is obtained immediately.
- Technical and formal requirements for making the video:
- Original document in good condition. No covers, photocopies, or laminated copies may be used.
- Focused, continuous, uninterrupted image
- Good lighting and facial visibility
- No items that hide the face (sunglasses, masks, hats)
- The citizen must be the holder of the document
If when performing video IDentification, the application asks you to give permissions to the camera follow the instructions below:
Go to applications/ find the default internet browser application you have (the one that opens the video ID, it can be Chrome, Firefox, EDGE, Android native, Samsung, etc) / go to permissions and assign permission to it camera, microphone, photos and videos.
The moral is clear: while a PIN is still a valid option, certain techniques can reduce its effective entropy when a malicious app accesses key sensors. The combination of Longer PINs, biometrics, random keyboards y sensor blocking during authentication, along with good permission hygiene, significantly raises the bar for any code-breaking attempts.
