Apple Vision Pro's Eye Tracking Exposed What People Type ๐Ÿ‘€

Summary:


  1. Eye Tracking Vulnerability
    Researchers have demonstrated a new attack, GAZEploit, that exploits eye-tracking data from Appleโ€™s Vision Pro headset to reveal passwords, PINs, and messages. By analyzing the gaze movements of a virtual avatar, attackers could decode what users typed with high accuracy.

  2. Attack Mechanism
    The attack involves creating a model to detect typing patterns based on eye movements and reconstructing keyboard inputs. The researchers achieved up to 92% accuracy in predicting messages and 77% in passwords within a few guesses.

  3. Appleโ€™s Response
    Apple was notified of the vulnerability in April and issued a patch by the end of July to address the issue. The attack highlights the potential risks of biometric data being used for surveillance and unauthorized access.

Read more at: Wired

1 Like