What’s happening
Attackers can discreetly record your screen or keyboard from a short distance (or use a compromised app to read screenshots) and run computer vision/OCR models to recover credentials and session data. This blends classic shoulder‑surfing with modern AI, making it faster, more accurate, and harder to notice.