• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Education

The Hidden Dangers of Multitasking: Texting During Skype Calls Raises Security Concerns

Paul Balo by Paul Balo
October 20, 2016
in Education
Share on FacebookShare on Twitter

We’ve all been there; working diligently in the office, engaged in a Voice Over Internet Protocol (VoIP) call such as Skype, but still powering through our computer tasks at the same time. It’s this kind of multitasking that keeps us productive and efficient. However, according to recent research, this kind of activity may have unintended consequences on our privacy and digital security.

Researchers Alberto Compagno of the University of Rome, Mauro Conti and Daniele Lain of the University of Padua, and Gene Tsudik from the University of California Irvine have published a study titled “Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.” In their paper, they introduce Skype & Type (S&T), a novel and disturbingly effective keyboard acoustic eavesdropping attack specific to VoIP systems. The researchers found that through this method, an attacker could guess correctly a random key pressed by the victim with a top-5 accuracy of 91.7%. The accuracy reduces but remains a considerable 41.89% even when the attacker doesn’t know the victim’s typing style or keyboard. Furthermore, this method holds robust under different VoIP issues, including internet bandwidth fluctuations and the masking effect of voices over keystrokes.

In an interview with Threatpost, Tsudik noted that the potentially widespread application of this attack sets it apart from previous skirmishes which required the adversary to have physical proximity to the target, detailed knowledge of their typing style and keyboard, and access to the typing sounds and their corresponding information.

Why is this new style of attack so effective? The answer lies in the unique sounds our keyboards make. The sounds emitted when typing, much like the distinct sounds from a piano’s keys, can be analysed by hackers to eavesdrop on our conversations. The most widely-used VoIP protocol, Session Initiation Protocol (SIP), transmits data, including these sounds, via the internet. This introduces a greater susceptibility to packet sniffing, a longstanding challenge in VoIP networks, and significantly raises the chance that keyboard sounds could be used to violate privacy.

The study indicates that hackers do face some limitations. For instance, a seasoned typist at the keyboard or multiple parties typing simultaneously on a call could confuse the eavesdropper. However, given how quickly threats evolve and the sheer number of computer or smartphone users that are only moderate typists, this hurdle for intruders is likely temporary.

All these factors point to a sobering possibility. The simple act of sending sensitive information, such as banking details, over a VoIP session could lead to our information being potentially hijacked and misused.

The researchers focused mainly on Skype during their study, but have started probing other platforms like Google Hangouts, under the premise that its susceptibility to S&T attacks may be similar to that of Skype. I believe evaluating the security of the popular messaging app WhatsApp, which also uses VoIP technology, would be insightful. WhatsApp had rolled out end-to-end encryption technology this year, securing all communication from source to destination. Following this, only one Israeli company claims to have broken WhatsApp’s security, a statement that has drawn skepticism from cybersecurity experts.

Establishing whether a hacker could in fact infiltrate WhatsApp’s reputedly impenetrable encryption would undoubtedly further our understanding of VoIP vulnerabilities.

A crucial discovery in this research was the attack’s dependency on bandwidth. In instances of low Internet bandwidth, VoIP software reduces the audible bandwidth, which surprisingly makes it easier for hackers to decipher keyboard background sounds. This holds implications on how we perceive cybersecurity threats, highlighting the fact that our infrastructure may unintentionally assist potential attackers.

In conclusion, I want to emphasize that the simplest way to reduce your risk of falling victim to this type of attack is to refrain from typing sensitive information during Skype or other VoIP calls. As the research points out, countermeasures against this threat are tough to develop, reinforcing the need for increased user awareness and caution.

This article was updated in 2025 to reflect modern realities.
.

Related Posts:

  • apps.23504.9007199266245651.6add88e5-d6c4-4b36-a1da-3fcd01d40fd5
    Microsoft Sunsets Skype as Expected, Teams to Replace It
  • nvidia
    DiffUHaul, an AI Tool from Nvidia Research, Enables…
  • SASCQ4QDRBPHVFIDDQZIJW3XRM
    How to Stay Safe When Buying Satellite Internet…
  • Discord E2EE
    Discord is Exploring the World of End-to-End…
  • outdoor-camera-hidden
    Airbnb Bans Indoor Cameras Amid Privacy Concerns
  • 59876751-fc4c-4475-9f36-3952b39f13aa
    Lumia, Skype and Why Startups Should Rethink Selling…
  • DSC04144_processed
    Samsung Debuts Voice Cloning AI That Can Respond To Calls
  • pausar-desarrollo-ia
    Musk, Top Researchers Call For Pause On AI Giant Experiments

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyber securityeducationencryptionhackersresearchsecurityskypetelecomvoip
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025
  • Musk’s xAI Unveils New Agentic Coding Model August 29, 2025
  • Google Launches Pixel Care+ Device Protection August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.