Building upon preexisting technology used to transmit data under water by sound waves, the researchers were able to use the microphone and speakers in an unmodified Lenovo T400 personal computer to transmit small amounts of information—keystrokes in the test case, though the hack could also transmit encryption keys, small text files and even passwords—from an isolated computer to a compromised one.