There is never any original content from that site, it's always rehashed crap, littered with buzzwords and reeking of the dead corpse of journalistic integrity.
Edited to add: This is one hell of a hack.
Already commented on the first submission: https://news.ycombinator.com/item?id=6933678
Additionally, there's the problem that there isn't a 'industry standard' OTP app, so there'd be no reference fingerprint to look for.
I would love to be proved wrong though. That'd be very cool.
(Notably about why playing music does not mitigate the threat.)
FLOSS is amazing. One day since research paper and your machines are already patched. This means that probably no one had enough time to actually use this attack vector in the wild.
>or you need to use a “sufficiently strong wide-band noise
>source.” Something like a swooping, large-orchestra
>classical concerto would probably do it.
Unless you're standing next to a live orchestra that's playing the concerto on specially designed dog-whistles, you're going to have a pretty hard time masking anything near the 150 kHz range.The authors give some ideas for mitigation, however, in section 11 of their paper [1] (appropriately titled "Mitigation").
[1] http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf