Keystroke Recognition Using WiFi Signals

We’re all doomed: In this paper, we propose a WiFi signal based keystroke recognition system called WiKey. WiKey consists of two Commercial Off-The-Shelf (COTS) WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types […]

WarSting: A Wi-Fi scanning sword for Hobbits.

To celebrate the launch of the new Hobbit flick, we made a version of Sting that turns blue near unsecured Wi-Fi networks. And when you slash the sword, Sting will jump on the network, and publish a message: “{YOUR WI-FI NETWORK} has been vanquished!” Instructables included, source on GitHub. WarSting: A Wi-Fi scanning sword for […]

re:publica ’13 Visitor Flow Analysis Using the Conference Wifi

How did the visitors of re:publica 2013 move from one session to the other? By mapping the wireless connections onto the floor plan we can visualize the visitor flow. (Translated the above from German. Lovely word, that Besucherstromanalyse … which translates to visitor flow analysis) re:log – Besucherstromanalyse per re:publica W-LAN →