{"id":12208,"date":"2024-08-08T12:50:48","date_gmt":"2024-08-08T12:50:48","guid":{"rendered":"https:\/\/topat10.com\/?p=12208"},"modified":"2024-08-08T12:50:48","modified_gmt":"2024-08-08T12:50:48","slug":"watch-how-a-hackers-infrared-laser-can-spy-on-your-laptops-keystrokes","status":"publish","type":"post","link":"https:\/\/topat10.com\/?p=12208","title":{"rendered":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">\u201cI think I&#8217;ve created the first laser microphone that&#8217;s actually modulated in the radio frequency domain,\u201d Kamkar says. \u201cOnce I have a radio signal, I can treat it like radio, and I can take advantage of all the tools that exist for radio communication.\u201d In other words, Kamkar converted sound into light into radio\u2014and then back again into sound.<\/p>\n<div data-testid=\"feature-large-callout\" class=\"CalloutFeatureLargeWrapper-cGjDsT fXVWFS\">\n<figure class=\"AssetEmbedWrapper-eVDQiB byBkf asset-embed\">\n<div class=\"AssetEmbedAssetContainer-eJxoAx dBHGoQ asset-embed__asset-container\"><span class=\"SpanWrapper-umhxW kGxnNB responsive-asset AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-cWuUZO dUOtEa AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset responsive-image\"><noscript><img decoding=\"async\" alt=\"Image may contain Adult Person Electronics Speaker Accessories Glasses Chair Furniture and Computer Hardware\" class=\"ResponsiveImageContainer-eybHBd fptoWY responsive-image__image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_1600%2Cc_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg\" data-sizes=\"auto\" data-srcset=\"https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_120,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 120w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_240,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 240w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_320,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 320w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_640,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 640w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_960,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 960w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_1280,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 1280w, https:\/\/media.wired.com\/photos\/66b3ef6bed705b9278666827\/master\/w_1600,c_limit\/20240804_Wired_Defcon_SamyKamkar_003.jpg 1600w\" sizes=\"100vw\"\/><\/noscript><\/picture><\/span><\/div>\n<p><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionText-bHjzlu iUEiRd kVUvEC iXWezO caption__text\">Samy Kamkar at his home workstation.<\/span><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionCredit-ejegDm iUEiRd isTgyB fNaHcW caption__credit\">Photograph: Roger Kisby<\/span><\/p>\n<\/figure>\n<\/div>\n<p class=\"paywall\">For his keystroke detection technique, Kamkar then fed the output of his laser microphone into an audio program called iZotopeRX to further remove noise and then an open source piece of software called <a data-offer-url=\"https:\/\/keytap3.ggerganov.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/keytap3.ggerganov.com\/&quot;}\" href=\"https:\/\/keytap3.ggerganov.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Keytap3<\/a> that can convert the sound of keystrokes into legible text. In fact, security researchers have demonstrated for years that keystroke audio, recorded from a nearby microphone, can be analyzed and deciphered into the text that a surveillance target is typing by distinguishing tiny acoustic differences in various keys. One group of researchers has shown that relatively precise text can even be derived from the sounds of keystrokes <a data-offer-url=\"https:\/\/arxiv.org\/pdf\/2308.01074\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arxiv.org\/pdf\/2308.01074&quot;}\" href=\"https:\/\/arxiv.org\/pdf\/2308.01074\" rel=\"nofollow noopener\" target=\"_blank\">recorded over a Zoom call<\/a>.<\/p>\n<p class=\"paywall\">Kamkar, however, was more interested in the 2009 Defcon demonstration in which security researchers Andrea Barisani and Daniele Bianco showed that they could use a simple laser microphone to roughly detect words typed on a keyboard, a trick that would allow long-distance line-of-sight spying. In that demo, the two Italian hackers only got as far as testing out their laser spying technique across the room from a laptop and generating a list of possible word pairs that matched the vibration signature they recorded.<\/p>\n<p class=\"paywall\">Speaking to WIRED, Barisani says their experiment was only a \u201cquick and dirty\u201d proof of concept compared to Kamkar&#8217;s more polished prototype. \u201cSamy is brilliant, and there was a lot of room for improvement,\u201d Barisani says. \u201cI&#8217;m 100 percent sure that he was able to improve our attack both in the hardware setup and the signal processing.\u201d<\/p>\n<div class=\"GenericCalloutWrapper-tojWn cEfrso callout--has-top-border\" data-testid=\"GenericCallout\">\n<div class=\"GroupCalloutWrapper-bPWknp dhHsN callout callout--group callout--group-2\" data-testid=\"GroupCalloutWrapper\">\n<figure class=\"AssetEmbedWrapper-eVDQiB byBkf asset-embed callout--group-item callout--group-item-1\">\n<div class=\"AssetEmbedAssetContainer-eJxoAx dBHGoQ asset-embed__asset-container\"><span class=\"SpanWrapper-umhxW kGxnNB responsive-asset AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-cWuUZO dUOtEa AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset responsive-image\"><noscript><img decoding=\"async\" alt=\"Image may contain Computer Hardware Electronics Hardware Monitor and Screen\" class=\"ResponsiveImageContainer-eybHBd fptoWY responsive-image__image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_1600%2Cc_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg\" data-sizes=\"auto\" data-srcset=\"https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_120,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 120w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_240,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 240w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_320,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 320w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_640,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 640w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_960,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 960w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_1280,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 1280w, https:\/\/media.wired.com\/photos\/66b3ef6c029c500caa827e35\/3:4\/w_1600,c_limit\/20240804_Wired_Defcon_SamyKamkar_006.jpg 1600w\" data-sizes=\"100vw\"\/><\/noscript><\/picture><\/span><\/div>\n<p><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionText-bHjzlu iUEiRd kVUvEC iXWezO caption__text\">Kamkar\u2019s laser spying kit: An infrared laser\u2026<\/span><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionCredit-ejegDm iUEiRd isTgyB fNaHcW caption__credit\">Photograph: Roger Kisby<\/span><\/p>\n<\/figure>\n<figure class=\"AssetEmbedWrapper-eVDQiB byBkf asset-embed callout--group-item callout--group-item-2\">\n<div class=\"AssetEmbedAssetContainer-eJxoAx dBHGoQ asset-embed__asset-container\"><span class=\"SpanWrapper-umhxW kGxnNB responsive-asset AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-cWuUZO dUOtEa AssetEmbedResponsiveAsset-cXBNxi eCxVQK asset-embed__responsive-asset responsive-image\"><noscript><img decoding=\"async\" alt=\"Image may contain Electronics Electrical Device Microphone Computer Hardware and Hardware\" class=\"ResponsiveImageContainer-eybHBd fptoWY responsive-image__image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_1600%2Cc_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg\" data-sizes=\"auto\" data-srcset=\"https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_120,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 120w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_240,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 240w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_320,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 320w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_640,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 640w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_960,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 960w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_1280,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 1280w, https:\/\/media.wired.com\/photos\/66b3ef6b042186bb6e24b38b\/3:4\/w_1600,c_limit\/20240804_Wired_Defcon_SamyKamkar_005.jpg 1600w\" data-sizes=\"100vw\"\/><\/noscript><\/picture><\/span><\/div>\n<p><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionText-bHjzlu iUEiRd kVUvEC iXWezO caption__text\">\u2026attached to an oscilloscope\u2019s signal generator, current controller, temperature controller, and amplifier power supply.<\/span><span class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ CaptionCredit-ejegDm iUEiRd isTgyB fNaHcW caption__credit\">Photograph: Roger Kisby<\/span><\/p>\n<\/figure>\n<\/div>\n<\/div>\n<p class=\"paywall\">Kamkar&#8217;s results do appear to be dramatically better: Some samples of text he recovered from typing with his laser mic setup and shared with WIRED were almost entirely legible, with only a missed letter every word or two; others showed somewhat spottier results. Kamkar&#8217;s laser microphone worked well enough for detecting keystrokes, in fact, that he also tested using it to record audio in a room more generally, by bouncing his infrared laser off a window. It produced remarkably clear sound, noticeably better than <a href=\"https:\/\/www.youtube.com\/watch?v=1MrudVza6mo\">other<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=K-96dX8ltO8\">samples<\/a> of laser microphone audio released online\u2014at least among those recorded stealthily from a window&#8217;s vibrations.<\/p>\n<p class=\"paywall\">Of course, given that laser microphones have existed for decades, Kamkar admits he doesn&#8217;t know what advancements the technology may have made in commercial implementations available to governments or law enforcement, not to mention even more secret, custom-built technologies potentially created or used by intelligence agencies. \u201cI would assume they&#8217;re doing this or something like it,\u201d Kamkar says.<\/p>\n<p class=\"paywall\">Unlike the creators of those professional spy tools, though, Kamkar is publishing the full schematics of his DIY laser microphone spy kit. \u201cIdeally, I want the public to know everything that intelligence agencies are doing, and the next thing, too,&#8221; Kamkar says. \u201cIf you don&#8217;t know something is possible, you&#8217;re probably not going to protect against it.\u201d<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\u201cI think I&#8217;ve created the first laser microphone that&#8217;s actually modulated in the radio frequency domain,\u201d Kamkar says. \u201cOnce I have a radio signal, I can treat it like radio, and I can take advantage of all the tools that exist for radio communication.\u201d In other words, Kamkar converted sound into light into radio\u2014and then [&hellip;]<\/p>\n","protected":false},"author":290,"featured_media":12209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[703],"tags":[2419,1603,2420,2021,2418,921],"class_list":["post-12208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-black-hat","tag-cybersecurity","tag-defcon","tag-hacks","tag-lasers","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us<\/title>\n<meta name=\"description\" content=\"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/topat10.com\/?p=12208\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us\" \/>\n<meta property=\"og:description\" content=\"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/topat10.com\/?p=12208\" \/>\n<meta property=\"og:site_name\" content=\"Unlock Informed Choices with Us\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-08T12:50:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Greenberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Greenberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208\"},\"author\":{\"name\":\"Andy Greenberg\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\"},\"headline\":\"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes\",\"datePublished\":\"2024-08-08T12:50:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208\"},\"wordCount\":575,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/20240804_Wired_Defcon_SamyKamkar_003.jpg\",\"keywords\":[\"black hat\",\"cybersecurity\",\"defcon\",\"hacks\",\"lasers\",\"security\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/topat10.com\\\/?p=12208#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208\",\"url\":\"https:\\\/\\\/topat10.com\\\/?p=12208\",\"name\":\"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/20240804_Wired_Defcon_SamyKamkar_003.jpg\",\"datePublished\":\"2024-08-08T12:50:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\"},\"description\":\"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/topat10.com\\\/?p=12208\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#primaryimage\",\"url\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/20240804_Wired_Defcon_SamyKamkar_003.jpg\",\"contentUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/20240804_Wired_Defcon_SamyKamkar_003.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=12208#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/topat10.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#website\",\"url\":\"https:\\\/\\\/topat10.com\\\/\",\"name\":\"Topat10.com\",\"description\":\"Your Trusted Source for Honest Reviews on the Best Online Services, Products, and Websites &ndash; Unlock Informed Choices with Us\",\"alternateName\":\"Topat10\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/topat10.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\",\"name\":\"Andy Greenberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"caption\":\"Andy Greenberg\"},\"url\":\"https:\\\/\\\/topat10.com\\\/?author=290\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us","description":"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/topat10.com\/?p=12208","og_locale":"en_US","og_type":"article","og_title":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us","og_description":"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.","og_url":"https:\/\/topat10.com\/?p=12208","og_site_name":"Unlock Informed Choices with Us","article_published_time":"2024-08-08T12:50:48+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","type":"image\/jpeg"}],"author":"Andy Greenberg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Andy Greenberg","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/topat10.com\/?p=12208#article","isPartOf":{"@id":"https:\/\/topat10.com\/?p=12208"},"author":{"name":"Andy Greenberg","@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478"},"headline":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes","datePublished":"2024-08-08T12:50:48+00:00","mainEntityOfPage":{"@id":"https:\/\/topat10.com\/?p=12208"},"wordCount":575,"commentCount":0,"image":{"@id":"https:\/\/topat10.com\/?p=12208#primaryimage"},"thumbnailUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","keywords":["black hat","cybersecurity","defcon","hacks","lasers","security"],"articleSection":["Technology"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/topat10.com\/?p=12208#respond"]}]},{"@type":"WebPage","@id":"https:\/\/topat10.com\/?p=12208","url":"https:\/\/topat10.com\/?p=12208","name":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes | Unlock Informed Choices with Us","isPartOf":{"@id":"https:\/\/topat10.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/topat10.com\/?p=12208#primaryimage"},"image":{"@id":"https:\/\/topat10.com\/?p=12208#primaryimage"},"thumbnailUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","datePublished":"2024-08-08T12:50:48+00:00","author":{"@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478"},"description":"Hacker Samy Kamkar is debuting his own open source version of a laser microphone\u2014a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you\u2019re typing.","breadcrumb":{"@id":"https:\/\/topat10.com\/?p=12208#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/topat10.com\/?p=12208"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/topat10.com\/?p=12208#primaryimage","url":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","contentUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/topat10.com\/?p=12208#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/topat10.com\/"},{"@type":"ListItem","position":2,"name":"Watch How a Hacker\u2019s Infrared Laser Can Spy on Your Laptop\u2019s Keystrokes"}]},{"@type":"WebSite","@id":"https:\/\/topat10.com\/#website","url":"https:\/\/topat10.com\/","name":"Topat10.com","description":"Your Trusted Source for Honest Reviews on the Best Online Services, Products, and Websites &ndash; Unlock Informed Choices with Us","alternateName":"Topat10","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/topat10.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478","name":"Andy Greenberg","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Andy Greenberg"},"url":"https:\/\/topat10.com\/?author=290"}]}},"jetpack_featured_media_url":"https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg","uagb_featured_image_src":{"full":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg",1600,1067,false],"thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-150x150.jpg",150,150,true],"medium":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-300x200.jpg",300,200,true],"medium_large":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-768x512.jpg",768,512,true],"large":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg",1600,1067,false],"mailpoet_newsletter_max":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg",1320,880,false],"woocommerce_thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-380x380.jpg",380,380,true],"woocommerce_single":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-1000x1067.jpg",1000,1067,true],"woocommerce_gallery_thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-120x120.jpg",120,120,true],"shareblock_justify":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-800x534.jpg",800,534,true],"shareblock_small":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-120x120.jpg",120,120,true],"shareblock_largeslider":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003.jpg",1600,1067,false],"shareblock_featurelarge":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-1000x650.jpg",1000,650,true],"shareblock_midlarge":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-760x600.jpg",760,600,true],"shareblock_slidergrid":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-500x350.jpg",500,350,true],"shareblock_featurelist":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-500x368.jpg",500,368,true],"shareblock_featuresmall":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-450x450.jpg",450,450,true],"shareblock_justify_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x13.jpg",20,13,true],"shareblock_small_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x20.jpg",20,20,true],"shareblock_largeslider_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x13.jpg",20,13,true],"shareblock_featurelarge_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x13.jpg",20,13,true],"shareblock_slidergrid_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x14.jpg",20,14,true],"shareblock_midlarge_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x16.jpg",20,16,true],"shareblock_featurelist_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x15.jpg",20,15,true],"shareblock_featuresmall_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2024\/08\/20240804_Wired_Defcon_SamyKamkar_003-20x20.jpg",20,20,true]},"uagb_author_info":{"display_name":"Andy Greenberg","author_link":"https:\/\/topat10.com\/?author=290"},"uagb_comment_info":0,"uagb_excerpt":"\u201cI think I&#8217;ve created the first laser microphone that&#8217;s actually modulated in the radio frequency domain,\u201d Kamkar says. \u201cOnce I have a radio signal, I can treat it like radio, and I can take advantage of all the tools that exist for radio communication.\u201d In other words, Kamkar converted sound into light into radio\u2014and then&hellip;","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts\/12208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12208"}],"version-history":[{"count":0,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts\/12208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/media\/12209"}],"wp:attachment":[{"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}