Categories
Technology World

Your keyboard is spying on you

New sonic keyboard technology uses your computer’s built-in microphone to monitor the sounds of your individual keystrokes, logging everything you do, according to new research conducted by Dr. Angstrom H. Troubadour and his team of unpaid graduate students.

This intuitive method of eavesdropping combines new with the old by “listening in” on audio footage through state-of-the-art noise analysis firmware, which is “baked into” PC components like the motherboard, but can also be flashed – or overwritten – with new, custom firmware that can also introduce privacy and security backdoors. Troubadour and his lab servants were able to find evidence of the keyboard spyware when a student was able to successfully visualize the data leaving her keyboard.

Computational artifacts reveal keylogging on a potentially global scale.Computational artifacts reveal keylogging on a potentially global scale.
Computational artifacts reveal keylogging on a potentially global scale.

“Go ahead and type a few sentences, and be sure to listen to your keyboard,” Dr. Troubadour writes in the study. “Notice how with each individual keystroke, your keys – although similar and seemingly identical – make slightly different sounds. Because the untrained ear doesn’t recognize these subtle, everyday variations, you might not realize they are there, but because every key has slight variations in tone, tenor and frequency – in fact, no two keystrokes are alike in the entire world (much less, keyboards) – and because every individual keystroke has its own microscopic variation, their frequencies are logged and checked against a database of known typing habits assigned to your unique hardwire profile, as supplied by Google, Apple and Facebook tracking services. Everything you have ever typed is just floating around out there, for sale to anyone and everyone who wants it.”

With advances in HTML5, the entirety of this method of eavesdropping takes place entirely within the hardware, and is completely untraceable. Troubadour and his team have not commented on the spyware’s origin.

[poll id=”3″]

The following message is brought to you by Lebal Drocer, Inc. who bring you Hate Radio, and fine humour magazine Internet Chronicle:

Are you worried about keyboard hackers spying on you? Consider the time-tested, EFF-approved Modern-Day Information Superhighway DOOMWAVE Surfin’ Set, from E.W. Laboratories.

Categories
World

PENTAGON IGNORES NEW EVIDENCE, CALLING L.A. UFO EXPLOSION ‘A MISSILE TEST’

CHRONICLE.SU EXCLUSIVE — The Pentagon has refused to address a series of photos which contradict government claims that strange lights seen over Los Angeles late Saturday night were attributable to a naval missile test.

Dozens of reports claim the object in the sky exploded and disappeared, but not before a missile made its way toward the object, exploding nearby, and evaporating both objects into the night sky.

Blind people wish they could see these harrowing images
“It looks like a missile was fired at the object.”

The event took place at very high altitude and could be seen from as far away as Las Vegas and Mexico.

The US Government is calling the event a failed missile test, but their explanation does not account for the presence of what onlookers say “were clearly two objects in the night sky.”

High definition video [below] shows part of the event.

Categories
World

Middle Eastern powermongering lost its thrill, Saudi leaders say

abuse-of-powerSaudi bombing raids are no longer fun, King Abdullah, leader of the Saudi Arabian peninsula, said after a Saturday bombing raid on Yemen.

“We bombed a 1,200-year-old mosque, a 13th century castle in Yemen, we bombed Syria, and today we even saw Egypt’s president Morsi sentenced to death,” Abdullah said. “It’s just not doing it for me anymore.”

The United States noticed the Saudi reign of terror was lackluster at best, Abdullah said, which is why they recently brought the Saudis into their juicy arms ring – a gun circle where computer-controlled ballistics, state-of-the-art rifles, and hegemony software packages are traded to allies.

“We were able to more systematically destroy neighboring cultures but once you’ve seen the death of one people’s spirit, you’ve seen them all.”