Author Archives: Jednoróg Rafał

How to hack a house using a laser

Reading Time: 2 minutes

If you use the software, such as voice assistants of the largest companies, you should be aware, as scientists discovered a new type of hacker attack!
The attack exploits the sensitivity of microphones using micro-electro-mechanical systems (MEMS). Microscopic MEMS elements react to light as if it were sound. Although researchers have tested the possibility of hacking only Siri, Alexa, Google Assistant, Facebook and a limited number of tablets and phones, they believe that all devices using MEMS microphones are vulnerable to this threat.

Below you can find a video showing how exactly this procedure works:
https://www.youtube.com/watch?time_continue=29&v=iK2PtdQs77c&feature=emb_title

The attack is based on the idea of exchanging the sound with a low-power laser beam directed at the device. Basically the lasers trick the microphones into making electrical signals as if they’re hearing someone’s voice. It works even from the distance of 110m and can be executed from another building, through glass windows or doors. It can be really dangerous as some people do not use the required authorization feature for certain commands so that hackers are able to open smart garage doors, order stuff from Amazon on your cost or even start your vehicle. 

Researchers who discovered this dangerous feature claim that the cost of producing a device that could hack any voice assistant, based on MEMS microphone, is about $400 including $340 laser driver, a $20 laser pointer and a $25 sound amplifier. The low costs and simplicity of using it, in this case, are not an advantage, as it makes it possible for almost anyone to make such a device at home, unfortunately for criminals as well.  

To protect your smart household I would highly recommend setting as many passwords as possible when it comes to the security of your voice assistant, moreover to place it in a part of your house which is not visible from outdoors. 

If you would like to find out more details on how exactly this hacker attack works, you can visit the website devoted to this solution:
https://lightcommands.com

sources:
https://lightcommands.com
https://www.cnet.com/news/lasers-can-seemingly-hack-alexa-google-home-and-siri
https://mlodytechnik.pl/news/29884-badacze-hakuja-siri-alexe-i-google-home-za-pomoca-wiazek-laserowych

Tagged , , ,

Artificial Intelligence Creates Artificial People

Reading Time: 2 minutes

What we see above is a bunch of different average people right?
The catch is none of them is real… 

Everyone knows that AI has been implemented in diverse applications, not only autonomic cars, management systems for factories or chatbots we see everyday. Recently it was implemented to a very specific application, namely creating nonexistent people and their faces. It might sound like a useless whim of bored programmers although it actually might be very useful for marketing agencies or graphic designers as they are royalty-free and available for everyone to use.

But how does that work?

Artificial intelligence has made it easier than ever to produce images that look completely real but are totally fake using Generative Adversarial Networks (GAN), a relatively new concept in Machine Learning, introduced for the first time in 2014. 

The essential components of every GAN are two neural networks:
-Generator that synthesizes new samples from scratch, a random vector (noise) so the initial output is also noise.
-Discriminator that takes samples from both the training data and the generator’s output and predicts if they are genuine or counterfeit.

Over time generator, as it receives data from the discriminator, it learns how to create more realistic images. Moreover discriminator also learns and improves by comparing synthesized photos with real images. In other words one network generates a fake face, while another decides if it’s realistic enough by comparing it with photos of actual people. If the test isn’t passed, the face generator tries again. To see yourself how well it works go to: https://thispersondoesnotexist.com.
Every time you refresh the page, you get a newly generated face. 

And if you get bored with fake faces you can always admire some AI generated cats: https://thiscatdoesnotexist.com, but in my opinion sometimes it gets quite creepy as it’s not as advanced as the system mentioned above… 

 

Sources:
-Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, Yoshua Bengio; „Generative Adversarial Nets”
-Tero Karras, Samuli Laine,  Timo Aila NVIDIA; „A Style-Based Generator Architecture for Generative Adversarial Networks”
-https://thispersondoesnotexist.com
-https://thiscatdoesnotexist.com

Tagged , , ,