Apple's Vision Pro has a way of showing the world a virtual version of you while you interact with others in virtual reality. Unfortunately960年代のポルノ映画 musyuusi無修正 this very feature – called Persona – could've been used by hackers to steal a Vision Pro user's sensitive data.
The security flaw was discovered by a group of six computer scientists from the University of Florida's Department of Computer Science, and it was first reported on by Wired.
The GAZEploit attack, as it was dubbed by the researchers, works by tracking the eye movements of a user's Persona to identify when they're typing something on the Vision Pro's virtual keyboard. The researchers discovered that users tend to direct their gaze onto specific keys that they're about to click, and were able to construct an algorithm that identified what the users were typing. The results were quite accurate; for example, the researchers were able to identify the correct letters of users' passwords 77 percent of the time. When it came to detecting what people were typing in a message, the results were accurate 92 percent of the time.
The researchers disclosed the vulnerability to Apple back in April, and Apple fixed it in visionOS 1.3, which came out in July. In the release notes, Apple says that the flaw enabled inputs to the virtual keyboard to be inferred from Persona.
"The issue was addressed by suspending Persona when the virtual keyboard is active," Apple wrote in the release notes. Vision Pro users who haven't yet updated to the latest version are advised to do so as soon as possible.
While simply disabling Persona while the user is typing was a pretty simple fix, the flaw does raise the question of just how much info a malicious hacker could infer just by observing a virtual version of you.
SEE ALSO: Apple Vision Pro: I watched a Billie Eilish concert in Bora Bora — and I didn't need to spend a pennyThe researchers said that the attack hasn't been used against someone using Personas in the real world. But what makes this attack particularly dangerous is that it only requires a video recording of someone's Persona while the person was typing, meaning an attacker could still use it on an older video. It seems that the only way to mitigate this issue is to erase any publicly available videos where your Persona is visible while typing; we've reached out to Apple for clarification on what can be done to protect your data.
Topics Apple Cybersecurity
Michigan vs. UW football live streams: kickoff time, streaming deals, and moreBernie Sanders has a colossal climate change planSuffer the Little ChildrenBest smartwatch deal: Get the Samsung Galaxy Watch 7 for its lowest price yet at AmazonGoogle is rolling out 'AIUT Vols vs. Arkansas football livestreams: kickoff time, streaming deals, and moreNYT Strands hints, answers for October 4Alabama vs. Vandy football livestreams without cable: Kickoff time, streaming deals, and moreAlabama vs. Vandy football livestreams without cable: Kickoff time, streaming deals, and moreMotoGP livestream: Watch the 2024 Japanese Grand Prix for free Making a Joyful Noise LTHS Shinnenkai: '2020 – A Virtual Success’ Higashi Temple Target in Possible Hate Crime Fundraiser, Protest Planned After Asian Man Is Killed in Assault From Route 66 to Broadway Virtual Celebration of Imagine Little Tokyo Short Story Contest Winners Photographer Gary Miyatake Passes at 69 Venice Hongwanji to Hold Silent Auction Online Rep. Takano Reintroduces Korematsu Grand Central Donuts
0.1951s , 9958.515625 kb
Copyright © 2025 Powered by 【1960年代のポルノ映画 musyuusi無修正】Apple fixes dangerous 'GAZEploit' Vision Pro security flaw,Feature Flash