Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

How to Use Voice Typing on Your Phone

6 July 2025

How the Binding of Two Brain Molecules Creates Memories That Last a Lifetime

6 July 2025

Meteorologists Say the National Weather Service Did Its Job in Texas

5 July 2025
Facebook X (Twitter) Instagram
Just In
  • How to Use Voice Typing on Your Phone
  • How the Binding of Two Brain Molecules Creates Memories That Last a Lifetime
  • Meteorologists Say the National Weather Service Did Its Job in Texas
  • The 55 Best Outdoor Deals From the REI 4th of July Sale
  • Security News This Week: Android May Soon Warn You About Fake Cell Towers
  • Everything You Can Do in the Photoshop Mobile App
  • Review: Bose Soundlink Plus Bluetooth Speaker
  • Is It Time to Stop Protecting the Grizzly Bear?
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Apple Vision Pro’s Eye Tracking Exposed What People Type
News

Apple Vision Pro’s Eye Tracking Exposed What People Type

News RoomBy News Room12 September 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

The GAZEploit attack consists of two parts, says Zhan, one of the lead researchers. First, the researchers created a way to identify when someone wearing the Vision Pro is typing by analyzing the 3D avatar they are sharing. For this, they trained a recurrent neural network, a type of deep learning model, with recordings of 30 people’s avatars while they completed a variety of typing tasks.

When someone is typing using the Vision Pro, their gaze fixates on the key they are likely to press, the researchers say, before quickly moving to the next key. “When we are typing our gaze will show some regular patterns,” Zhan says.

Wang says these patterns are more common during typing than if someone is browsing a website or watching a video while wearing the headset. “During tasks like gaze typing, the frequency of your eye blinking decreases because you are more focused,” Wang says. In short: Looking at a QWERTY keyboard and moving between the letters is a pretty distinct behavior.

The second part of the research, Zhan explains, uses geometric calculations to work out where someone has positioned the keyboard and the size they’ve made it. “The only requirement is that as long as we get enough gaze information that can accurately recover the keyboard, then all following keystrokes can be detected.”

Combining these two elements, they were able to predict the keys someone was likely to be typing. In a series of lab tests, they didn’t have any knowledge of the victim’s typing habits, speed, or know where the keyboard was placed. However, the researchers could predict the correct letters typed, in a maximum of five guesses, with 92.1 percent accuracy in messages, 77 percent of the time for passwords, 73 percent of the time for PINs, and 86.1 percent of occasions for emails, URLs, and webpages. (On the first guess, the letters would be right between 35 and 59 percent of the time, depending on what kind of information they were trying to work out.) Duplicate letters and typos add extra challenges.

“It’s very powerful to know where someone is looking,” says Alexandra Papoutsaki, an associate professor of computer science at Pomona College who has studied eye tracking for years and reviewed the GAZEploit research for WIRED.

Papoutsaki says the work stands out as it only relies on the video feed of someone’s Persona, making it a more “realistic” space for an attack to happen when compared to a hacker getting hands-on with someone’s headset and trying to access eye tracking data. “The fact that now someone, just by streaming their Persona, could expose potentially what they’re doing is where the vulnerability becomes a lot more critical,” Papoutsaki says.

While the attack was created in lab settings and hasn’t been used against anyone using Personas in the real world, the researchers say there are ways hackers could have abused the data leakage. They say, theoretically at least, a criminal could share a file with a victim during a Zoom call, resulting in them logging into, say, a Google or Microsoft account. The attacker could then record the Persona while their target logs in and use the attack method to recover their password and access their account.

Quick Fixes

The GAZEploit researchers reported their findings to Apple in April and subsequently sent the company their proof-of-concept code so the attack could be replicated. Apple fixed the flaw in a Vision Pro software update at the end of July, which stops the sharing of a Persona if someone is using the virtual keyboard.

An Apple spokesperson confirmed the company fixed the vulnerability, saying it was addressed in VisionOS 1.3. The company’s software update notes do not mention the fix, but it is detailed in the company’s security-specific note. The researchers say Apple assigned CVE-2024-40865 for the vulnerability and recommend people download the latest software updates.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenAI’s advanced ‘Project Strawberry’ model has finally arrived
Next Article Does the iPhone 16 have a 120Hz display?

Related Articles

News

How to Use Voice Typing on Your Phone

6 July 2025
News

How the Binding of Two Brain Molecules Creates Memories That Last a Lifetime

6 July 2025
News

Meteorologists Say the National Weather Service Did Its Job in Texas

5 July 2025
News

The 55 Best Outdoor Deals From the REI 4th of July Sale

5 July 2025
News

Security News This Week: Android May Soon Warn You About Fake Cell Towers

5 July 2025
News

Everything You Can Do in the Photoshop Mobile App

5 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

Everything You Can Do in the Photoshop Mobile App

News Room5 July 2025
News

Review: Bose Soundlink Plus Bluetooth Speaker

News Room5 July 2025
News

Is It Time to Stop Protecting the Grizzly Bear?

News Room5 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024101 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

The 55 Best Outdoor Deals From the REI 4th of July Sale

5 July 2025

Security News This Week: Android May Soon Warn You About Fake Cell Towers

5 July 2025

Everything You Can Do in the Photoshop Mobile App

5 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.