TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hard disks can be turned into listening devices

279 pointsby bjokoabout 6 years ago

19 comments

degenerateabout 6 years ago
Buried 4&#x2F;5 down the page: &quot;<i>One limiting aspect of the described technique is that it requires a fairly loud conversation in the vicinity of the eavesdropping hard drive. To record comprehensible speech, the conversation had to reach 85 dBA, with 75 dBA being the low threshold for capturing muffled sound.</i>&quot;<p>For context, a vacuum cleaner is also 75 decibels, with 80db as the threshold for hearing loss: <a href="https:&#x2F;&#x2F;ehs.yale.edu&#x2F;sites&#x2F;default&#x2F;files&#x2F;files&#x2F;decibel-level-chart.pdf" rel="nofollow">https:&#x2F;&#x2F;ehs.yale.edu&#x2F;sites&#x2F;default&#x2F;files&#x2F;files&#x2F;decibel-level...</a><p>So you literally have to scream at each other right in front of the hard drive for it to record discernible speech. This is not an &quot;eavesdropping mic&quot; as the subheading of the article claims. Therefore, it&#x27;s yet another clickbait BS fearmongering article about an interesting tech hack.
评论 #19342035 未加载
评论 #19340675 未加载
评论 #19340778 未加载
评论 #19341076 未加载
评论 #19340548 未加载
评论 #19343446 未加载
评论 #19340523 未加载
评论 #19340662 未加载
评论 #19341537 未加载
评论 #19342863 未加载
评论 #19342476 未加载
评论 #19340501 未加载
评论 #19340868 未加载
评论 #19341659 未加载
评论 #19342445 未加载
评论 #19341756 未加载
评论 #19344308 未加载
评论 #19341550 未加载
评论 #19348562 未加载
评论 #19340481 未加载
ChuckMcMabout 6 years ago
Wow, that is super fun. There is a story which I can neither confirm nor deny that a company with large data centers and drive firmware that exported PES data was able to correlate data from drives in different locations of said data center and make a seismic interferometer which could &quot;image&quot; traffic on a freeway nearby. :-)<p>I had no idea you could get as much as 4KHz of frequency bandwidth out of those sensors. That is a pretty cool result.
评论 #19342188 未加载
roywigginsabout 6 years ago
Prior art: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tDacjrSCeq4" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tDacjrSCeq4</a>
评论 #19342972 未加载
AndrewKemendoabout 6 years ago
Any system that converts physical energy to electric activity (loosely: transducer) can be used to collect signals remotely.<p>I think this is kind of a basic thing that once you know it, you see the possibilities almost everywhere, where you understand how electrical fields can be generated with physical interaction. Transportation of the sensing then becomes the next problem to solve.
johnnycababout 6 years ago
The inaudible range is far more likely to used as an attack vector for nefarious purposes.<p><a href="https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1708.09537.pdf" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1708.09537.pdf</a><p><a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2017&#x2F;05&#x2F;theres-a-spike-in-android-apps-that-covertly-listen-for-inaudible-sounds-in-ads&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2017&#x2F;05&#x2F;there...</a>
gamblerabout 6 years ago
I wonder whether there is a way to reconfigure audio jacks into microphone jacks on an average sound card these days. Little known fact: speakers and headphones are also microphones simply by the physics of how they work.
评论 #19341596 未加载
评论 #19340904 未加载
评论 #19341555 未加载
评论 #19341594 未加载
fit2ruleabout 6 years ago
Story time: I was a young programmer in the 80&#x27;s, working in an environment where the computers were all housed in their own special isolated computer room, and we devs had to use terminals to gain access - a typical computer ops setup, you&#x27;ve seen it all before.<p>One day, in order to comply with some law or other, the company upgraded the security system, renovating the space such that it was enclosed in bullet-proof glass panels, required a key-card to enter, had an operator at all times (24&#x2F;7), etc. They installed a Halon fire suppression system, and a gigantic alarm horn to function as a company-wide alert.<p>Well, the day it was all set up, it was time to test it all - Halon test dump, done (very expensive test). Operator still alive (had to use an oxygen mask), done. Alarm siren test: done. Okay, back to work .. hang on .. all of the systems are down .. what&#x27;s going on ..<p>Yes, the siren was so loud, and had been positioned close enough to the bullet-proof walls, that the focused energy it created had crashed the disks. ;)<p>That was a very expensive renovation. Fortunately, we got the &#x27;restore from last backup&#x27; test done pretty quickly ..
DevX101about 6 years ago
I&#x27;ve always been interested to know what kinds of physical attacks security consultants at major firms have uncovered. How many &#x27;obscure&#x27; espionage techniques like this or listening for keystroke combinations via audio have been deployed in the real world for malicious purposes?
评论 #19341103 未加载
squarefootabout 6 years ago
Also any fast enough accelerometer can be used as a microphone, and no user would complain if an app would ask permissions to use the accelerometer and network pretending they&#x27;re needed for positioning and updates. Not sure though how many phones are using fast enough accelerometers to be used to sample voice. Most should go up to a few hundred Hertz with the right software, but human voice requires at least a few KHz bandwidth.
donatjabout 6 years ago
Interesting. I just watched a video yesterday about how you could see screaming on hard drive stats in a data center:<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tDacjrSCeq4" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tDacjrSCeq4</a>
zelon88about 6 years ago
It would be way easier to just, you know, eavesdrop with the actual microphone instead?<p>Although it is a cool experiment and POC. A few years ago I took apart 5 HDD&#x27;s to see if I could make a usable speaker (as a desk&#x2F;novelty thing). 2 of them worked, one of them worked with decent fidelity. Three failed (probably my fault). The one that worked was a literally massive double-5.25&quot; Maxtor.
ngneerabout 6 years ago
The latest in a long long line of TEMPEST research. I think I would prefer to see academic security research steered in the direction of solving problems affecting millions, but an interesting discovery nonetheless.
postitabout 6 years ago
I remember watching an old YouTube movie from Brendan Gregg where he screams in front of a sun NAS and the voice vibration affects the HD reading speed among other parameters.
评论 #19344034 未加载
JoachimSabout 6 years ago
So HDDs would benefit from the meta material that kills sound:<p><a href="https:&#x2F;&#x2F;www.bu.edu&#x2F;research&#x2F;articles&#x2F;researchers-develop-acoustic-metamaterial-noise-cancellation-device&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.bu.edu&#x2F;research&#x2F;articles&#x2F;researchers-develop-aco...</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19344682" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19344682</a>
zepearlabout 6 years ago
This is interesting probably only from an academic point of view (as stated in the article) and only a corner case of what could be done when having the possibility to replace the firmware of a HDD.
gumbyabout 6 years ago
I can&#x27;t believe The Register of all sites managed to write this article without making a voice coil pun.
phkahlerabout 6 years ago
So the signal already exists in the software. Just make it available via a &quot;secret&quot; file.
egwynnabout 6 years ago
Guess I picked the wrong week to start shouting secrets at my hard drive.
arcasterabout 6 years ago
&quot;OH MAN - IF WE TALK THIS LOUD SOME ASSHOLE WHO HACKED OUR HARD-DRIVE MIGHT BE ABLE TO HEAR US&quot; - govt worker | &quot;CHRIST MAN WE&#x27;RE TRYING TO HAVE A MEETING IN THE SOUNDPROOF MEETING ROOM WE MADE SO PEOPLE WITH HACKED HARD DRIVES COULDN&#x27;T HEAR US!&quot; - gov&#x27;t manager 1 &quot;HARD-DRIVES MAN [shakes fist at desktop]&quot; - govt worker