Lemmy.one
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
BrikoX@lemmy.zip to Cybersecurity@sh.itjust.worksEnglish · 8 months ago

Apple Vision Pro’s Eye Tracking Exposed What People Type

www.wired.com

external-link
message-square
11
fedilink
  • cross-posted to:
  • technology@lemmit.online
  • technology@lemmy.world
87
external-link

Apple Vision Pro’s Eye Tracking Exposed What People Type

www.wired.com

BrikoX@lemmy.zip to Cybersecurity@sh.itjust.worksEnglish · 8 months ago
message-square
11
fedilink
  • cross-posted to:
  • technology@lemmit.online
  • technology@lemmy.world
The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.

The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.

Archived version: https://web.archive.org/web/20240912100207/https://www.wired.com/story/apple-vision-pro-persona-eye-tracking-spy-typing/

  • HubertManne@moist.catsweat.com
    link
    fedilink
    arrow-up
    2
    ·
    8 months ago

    bet same for video calls.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 246 users / day
  • 678 users / week
  • 1.54K users / month
  • 4.61K users / 6 months
  • 53 local subscribers
  • 7.16K subscribers
  • 2.76K Posts
  • 5.29K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.7
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org