acoustic-keylogger VS tpm.dev.tutorials

Compare acoustic-keylogger vs tpm.dev.tutorials and see what are their differences.

acoustic-keylogger

Pipeline of a keylogging attack using just an audio signal and unsupervised learning. (by shoyo)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
acoustic-keylogger tpm.dev.tutorials
4 3
86 80
- -
0.0 10.0
over 1 year ago about 2 years ago
Python Shell
- Creative Commons Attribution Share Alike 4.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

acoustic-keylogger

Posts with mentions or reviews of acoustic-keylogger. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-02.

tpm.dev.tutorials

Posts with mentions or reviews of tpm.dev.tutorials. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-24.
  • Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
    3 projects | news.ycombinator.com | 24 Aug 2023
    >> The discrete TPM's threat model was never designed to cover you from attackers using oscilloscope to probe your laptop's SPI bus during the boot process for unencrypted data.

    This is not really true. All TPMs (or at least since v2.0, but no matter if discrete or not) support encrypted session against passive eavesdroppers. There is also the possibility to protect against MiTM attacks, but that is more complex (since you then need to setup credentials).

    See here [0]:

    "Encryption sessions are useful for when the path to a TPM is not trused, such as when a TPM is a remote TPM, or when otherwise the path to the TPM is not trusted."

    The issue is that the OS / Bootloader does not implement such mechanism.

    [0] https://github.com/tpm2dev/tpm.dev.tutorials/blob/master/Int...

  • AMD's Firmware TPMs Vulnerable to Hardware Attacks, Defeating Disk Encryption
    3 projects | news.ycombinator.com | 2 May 2023
    > A dTPM uses an unencrypted protocol to communicate with the CPU

    While that is strictly speaking true, the TPM command set allows you to set up an encrypted session to the TPM using an ECDH or RSA key for key exchange that authenticates the TPM.

    The problem is that the BMCs and BIOSes out there don't record a public key for a primary key on the TPM and then don't bother using encrypted sessions (not even opportunistically getting that public key from the TPM, which would defeat passive attacks).

    That's a software problem, not a TPM problem!

    I know that TPM 2.0 is a huge topic, so it's quite forgivable that people don't know these things. I've written a tutorial that might help: https://github.com/tpm2dev/tpm.dev.tutorials/tree/master/Int...

  • The Trusted Platform Module Key Hierarchy
    1 project | news.ycombinator.com | 4 Dec 2022
    https://github.com/tpm2dev/tpm.dev.tutorials/tree/master/Int...

    I have learned a fair bit since I wrote it, so I should probably edit it.

What are some alternatives?

When comparing acoustic-keylogger and tpm.dev.tutorials you can also consider the following projects:

Stitch - Python Remote Administration Tool (RAT)

systemd - The systemd System and Service Manager

HiddenEye-Legacy - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]

pulseview - Read-only mirror of the official repo at git://sigrok.org/pulseview. Pull requests welcome. Please file bugreports at sigrok.org/bugzilla.

Revisiting-Contrastive-SSL - Revisiting Contrastive Methods for Unsupervised Learning of Visual Representations. [NeurIPS 2021]

KeyLogger-WebService - "KeyLogger-WebService" Is a Keylogger Write In python.