Malicious app required to make “Pixnapping” attack work requires no permissions.

  • Creat@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    13
    ·
    3 months ago

    The attack seems similar to sidechannel attacks for CPUs, where you’d essentially read protected memory by observing side effects. Same idea but with pixels sent to the display.

  • FishFace@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 months ago

    Interesting. I wonder what it is that causes the render times to be different and how much noise there is. Maybe the solution will be to worsen timer accuracy!

  • limerod@reddthat.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 months ago

    Here I thought not giving accessibility permission, draw over apps permission among others meant I was safe.

    Guess, there’s always something on the corner. More infuriating, this was disclosed in February and google has yet to completely fix the issue. I doubt I would be getting a proper fix any time sooner than march at this pace.

    • BrikoX@lemmy.zipOPM
      link
      fedilink
      English
      arrow-up
      26
      ·
      edit-2
      3 months ago

      Except attack “requires no permissions” for the app to work.

    • XLE@piefed.social
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      3
      ·
      3 months ago

      The article is pretty clear that the issue is with the Android devices themselves, not with lazy users. There is no indication that a malicious app has these permissions.