Is 2FA using SMS Secure?

In case you were still in doubt after this SIM port horror story from back in May: We examined the authentication procedures used by five prepaid wireless carriers when a customer attempts to change their SIM card, or SIM swap. We found that all five carriers use insecure authentication challenges that can easily be subverted …

Keystroke Recognition Using WiFi Signals

We’re all doomed: In this paper, we propose a WiFi signal based keystroke recognition system called WiKey. WiKey consists of two Commercial Off-The-Shelf (COTS) WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types …

Introducing Paper

Paper takes the standard Facebook News Feed and recreates it as an immersive, horizontally scrolling set of screens. It also provides a new way to post to Facebook (and Paper) with an elegant WYSIWYG editor that borrows the styling of Medium’s and Svbltle’s blogging systems. Finally, yes, it’s a news-reading app that owes some of …

Paper: Selecting good still frames from a video

In this paper, we train a computer to select still frames from video that work well as candid portraits. Because of the subjective nature of this task, we conduct a human subjects study to collect ratings of video frames across multiple videos. Then, we compute a number of features and train a model to predict …