Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by Cactus on Tuesday February 18 2014, @01:18AM   Printer-friendly
from the I-want-a-whistle-in-my-cereal dept.
Gaaark writes:

Google acquires SlickLogin: dogs go wild!

SlickLogin, an Israeli start-up, is behind the technology that allows websites to verify a user's identity by using sound waves. It works by playing a uniquely generated, nearly-silent sound through your computer speakers, which is picked up by an app on your smartphone. The app analyses the sound and sends a signal back to confirm your identity.

The firm confirmed the acquisition on its website but did not provide any financial details of the deal.

Too bad they don't still put whistles inside packages of Cap'n Crunch cereal!

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by KibiByte on Tuesday February 18 2014, @03:06AM

    by KibiByte (1024) on Tuesday February 18 2014, @03:06AM (#1329)

    The problem here is 'nearly silent' which pretty much indicates to me that this would be done around the outside of the typical range of hearing for an adult but is still reproducible by typical consumer-grade hardware. That's roughly a range of 6KHz to play around in, for most adults.

    But the problem is making sure nobody else is hearing it, which means low power. Higher frequencies require higher amounts of power to go any truly appreciable distance. Inverse square makes this even worse.

    This is similar to the 'audio bug' that was discussed on other sites last month. Just as infeasible now as it was then.

    --
    The One True Unit UID
    Starting Score:    1  point
    Moderation   +4  
       Insightful=3, Informative=1, Total=4
    Extra 'Insightful' Modifier   0  

    Total Score:   5  
  • (Score: 3, Informative) by Angry Jesus on Tuesday February 18 2014, @04:38AM

    by Angry Jesus (182) on Tuesday February 18 2014, @04:38AM (#1397)

    I think you are reading more into "nearly silent" than is there. It could simply refer to volume. After all, part of the description is that the user holds his phone up to the speaker.

    • (Score: 1) by dmc on Tuesday February 18 2014, @05:19AM

      by dmc (188) on Tuesday February 18 2014, @05:19AM (#1419)

      "
      I think you are reading more into "nearly silent" than is there. It could simply refer to volume. After all, part of the description is that the user holds his phone up to the speaker.
      "

      I wanted to mod you informative for RTFA, but I wanted even less to RTFA myself. Until you said this, I too was presuming it was less user-intensive than holding the phone up to a speaker that isn't muted (e.g. due to headphone usage). I of course thought that due to remembering the audio-transmission virus some security research detected that is an attack against non(traditionally)networked systems. (it wasn't actually infection while offline, but reinfection using the audio-networking to get the full virus code back after a ram/disk wipe. I.e. advanced persistent threat hiding in firmware that is just smart enough to be able to fetch the rest of its code from network if available, or even over the air with such inaudible audio if need be)

      • (Score: 1) by dilbert on Tuesday February 18 2014, @02:26PM

        by dilbert (444) on Tuesday February 18 2014, @02:26PM (#1612)
        I think the malware you're referring to was called BadBIOS
        • (Score: 1) by dilbert on Tuesday February 18 2014, @02:30PM

          by dilbert (444) on Tuesday February 18 2014, @02:30PM (#1614)
          Doesn't look like my linking worked. Here is the link to BadBIOS:

          http://arstechnica.com/security/2013/10/meet-bad bios-the-mysterious-mac-and-pc-malware-that-jumps- airgaps/

  • (Score: 5, Informative) by Angry Jesus on Tuesday February 18 2014, @05:45AM

    by Angry Jesus (182) on Tuesday February 18 2014, @05:45AM (#1429)

    This is similar to the 'audio bug' that was discussed on other sites last month. Just as infeasible now as it was then.

    I missed that line when I first responded. You need to read this paper.

    http://www.jocm.us/index.php?m=content&c=index&a=s how&catid=124&id=600 [www.jocm.us]

    Some scientists at Fraunhofer were able to do exactly what the BadBios guy was claiming - covert acoustical mesh networking using nothing more than off-the-shelf lenovo laptops and well-known software algorithms. Nothing about viral replication, just the acoustic data transmission part.

    • (Score: 1) by KibiByte on Tuesday February 18 2014, @06:11AM

      by KibiByte (1024) on Tuesday February 18 2014, @06:11AM (#1437)

      That's a pretty good read. Sadly, it appears they're using the same models and units. I'd like to see this done across different units with similar results, as one of the original BadBios claims was something that could infect any computer, running any OS.

      --
      The One True Unit UID
    • (Score: 0) by Anonymous Coward on Thursday March 06 2014, @09:08AM

      by Anonymous Coward on Thursday March 06 2014, @09:08AM (#11841)

      mM7Pgd wine , garcinia cambogia extract [studioxnyc.com], [url=http://studioxnyc.com/]garcinia cambogia extract[/url], http://studioxnyc.com/ [studioxnyc.com] garcinia cambogia extract, 670,