• moon@lemmy.ml
    link
    fedilink
    arrow-up
    6
    ·
    7 months ago

    A billion vulnerable users is wild. I’m sure there are government entities taking advantage of this already

  • sawa@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    7 months ago

    TLDR:

    This study mainly targets Pinyin input, the most popular Chinese input method (hence 1bn potentially affected).

    Vulnerabilities were due to the keyboards’ use of the cloud for dictionaries used in IMEs (essentially a conversion engine). Such IMEs are must-haves for certain languages and converts A-Zs to other scripts. Lack of E2EE resulted in exposed keystrokes.


    Personally I would recommend switching to something which uses a local dictionary. RIME is a good FOSS alternative and can be configured to work on Android via fcitx.

    While the study doesn’t cover English keyboards, this is as good a reminder as any not to use in-built dictionaries in general unless you have to.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      If you are in China you also have to be very worried about the Chinese government. This is just one out of hundreds of other tools they have to detect disloyalty

  • I_Miss_Daniel@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    Swype is not listed in this document.

    I didn’t read far enough to see if it only affected pinyin (Chinese) cloud features or all languages.

  • delirious_owl@discuss.online
    link
    fedilink
    arrow-up
    1
    ·
    7 months ago

    This report is not about how operators of cloud-based IMEs read users’ keystrokes, which is a phenomenon that has already been extensively studied and documented. This report is primarily concerned with the issue of protecting this sensitive data from network eavesdroppers.

    So basically, even after these vulns are fixed, the attacker can just NSL the cloud providers and, boom, surveillance slurping continues.