Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Vision Pro Typing Vulnerability: How GAZEploit Can Steal Your Passwords
Researchers discovered the GAZEploit attack, exploiting eye movements to predict keyboard inputs on Apple’s Vision Pro. By analyzing 3D avatars, they achieved up to 92.1% accuracy in lab tests, posing significant security risks. Apple patched this vulnerability in VisionOS 1.3, preventing Persona sharing during virtual…

Hot Take:
Who needs a crystal ball when you’ve got a Vision Pro? GAZEploit just made eye contact way more awkward.
Key Points:
- GAZEploit attack tracks gaze patterns to predict typed keys on Vision Pro.
- Uses recurrent neural networks trained on typing avatars for accuracy.
- Research showed up to 92.1% accuracy in predicting typed letters.
- Apple patched the vulnerability in VisionOS 1.3 after researchers reported it.
- Potential for real-world exploitation during virtual meetings and typing tasks.
