TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Headphones can be hijacked to surreptitiously record audio

192 点作者 tonybeltramelli超过 8 年前

19 条评论

bcheung超过 8 年前
Here&#x27;s a neat party trick for you.<p>I had a MacGyver moment in the past where I made a phone call with only are pair of old earbuds and a phone cord (no switches, no dial pad).<p>A speaker is basically the same thing as a microphone in reverse. Normally it takes an electrical signal to move a physical element that creates the sound waves. But you can also move the element and it will generate an electrical signal.<p>To dial you can use the old rotary trick. The old phones dialed by pulses of quickly disconnecting and reconnecting. You can do that by hand if you want but it might require a little bit of practice and dexterity. Basically if you want to dial a 5, just disconnect the wire from the headphone to the phone cord and then reconnect it 5 times in a row.<p>You have to both listen and speak through the ear bud. Not the best quality or easiest to do but it works.
评论 #13017551 未加载
评论 #13017402 未加载
评论 #13018362 未加载
评论 #13018407 未加载
评论 #13018107 未加载
评论 #13018211 未加载
评论 #13017705 未加载
评论 #13017230 未加载
IshKebab超过 8 年前
The bit you want to know:<p>&gt; Their malware uses a little-known feature of RealTek audio codec chips to silently “retask” the computer’s output channel as an input channel
评论 #13017398 未加载
评论 #13017039 未加载
elcapitan超过 8 年前
Interesting research, but with people already plugging those headphones into a portable surveillance set, and plus them using headsets (which are already microphones as well), this seems a bit chasing the wrong target?<p>(Assuming that the connected computer is compromised also already implies that the attacker has a microphone at their disposal, with most modern devices like smartphones, tablets and mobile computers)
评论 #13016297 未加载
tonybeltramelli超过 8 年前
paper: <a href="http:&#x2F;&#x2F;cyber.bgu.ac.il&#x2F;advanced-cyber&#x2F;system&#x2F;files&#x2F;SPEAKE%28a%29R.pdf" rel="nofollow">http:&#x2F;&#x2F;cyber.bgu.ac.il&#x2F;advanced-cyber&#x2F;system&#x2F;files&#x2F;SPEAKE%28...</a><p>video: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=ez3o8aIZCDM" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=ez3o8aIZCDM</a><p>&quot;It’s no surprise that earbuds can function as microphones in a pinch [...] But the researchers took that hack a step further. Their malware [...] silently “retask” the computer’s output channel as an input channel, allowing the malware to record audio even when the headphones remain connected into an input-only jack and don’t even have a microphone channel on their plug.&quot;
评论 #13014669 未加载
评论 #13014649 未加载
评论 #13015217 未加载
orblivion超过 8 年前
Would be cool if Purism or similar companies had a nice big hardware switch that controlled access to any recording equipment.
评论 #13015555 未加载
mthoms超过 8 年前
One thing that&#x27;s not clear from the article - are external headphones <i>required</i> for this to work? Can this not be done with the built-in speakers?
评论 #13016960 未加载
评论 #13016833 未加载
mark-r超过 8 年前
Analog headphone amplifiers are quite easy to come by and can fix the problem for the ultimate paranoids.
评论 #13016301 未加载
评论 #13018694 未加载
hotdogs超过 8 年前
&quot;Great. Now Even Your Headphones Can Spy on You&quot; Ironic coming from Wired, one of the most ad&#x2F;tracker infested sites you could visit.
评论 #13017667 未加载
gnicholas超过 8 年前
Finally we know why Apple ditched the minijack on the iPhone 7...
评论 #13021288 未加载
MisterBastahrd超过 8 年前
What we need here is a non-profit to vett devices and appliances against uninvited listening.
评论 #13016626 未加载
评论 #13016782 未加载
Animats超过 8 年前
Incidentally, if Wired&#x27;s ad-blocking &quot;veil&quot; gets in the way, right click, select &quot;Inspect Element&quot;, find the &quot;veil&quot; item, right click, and select &quot;Delete Node&quot;. No more veil.
posterboy超过 8 年前
makes me wonder if the same thing goes for screens, because the reverse photoelectric effect in LEDs can be reversed.
评论 #13017029 未加载
评论 #13016741 未加载
mcs超过 8 年前
This technique was just as valid 8 years ago as it is today. The only difference today is that the realtek chipsets with port reassignment are more prevalent.
ff10超过 8 年前
Do Apple machines really use Realtek audio chips? Is reassigning port direction possible even when there&#x27;s just one physical plug?
评论 #13014957 未加载
评论 #13014787 未加载
评论 #13016533 未加载
评论 #13014788 未加载
some1else超过 8 年前
I wish there was an easy way to do the opposite in control panel. Having two audio outputs on a laptop comes in handy.
sqldba超过 8 年前
The article as a whole is quite sensationalist.<p>Once people have access to your underlying device - what exactly do you think is going to happen?<p>&quot;Oh but if you disconnected your microphone then think again&quot;. How many bloody people do that? A few dozen in the world?<p>What a piece of shit.<p>Now the technical underpinning that jacks can be reassigned isn&#x27;t new for Realtek, lots of PC motherboards have given the option for years and years.<p>This is all not really news.
jastanton超过 8 年前
Serious question: I understand the argument against the classic &quot;why should I care if someone records my conversations? I don&#x27;t do anything illegal.&quot;, being that once the government starts recording everything you say the freedom of being able to say anything negative against them goes away knowing they could be listening. That said, why should I, a boring law abiding citizen, go around disabling my hardware and covering webcams etc...? If someone were to ask my what I was doing, just the fact that it&#x27;s possible to hijack desktop mics is that enough for me to start putting faraday cages around myself? Serious question. Thanks :)
评论 #13015174 未加载
评论 #13014930 未加载
评论 #13016032 未加载
评论 #13014956 未加载
评论 #13015509 未加载
评论 #13016300 未加载
评论 #13015712 未加载
评论 #13017684 未加载
评论 #13015523 未加载
评论 #13015191 未加载
评论 #13015072 未加载
评论 #13015019 未加载
dang超过 8 年前
We changed the baity title to representative language from the article. If anyone suggests a better (more accurate and neutral) title, we can change it again.
69mlgsniperdad超过 8 年前
Are there more details of the &#x27;hack&#x27; somewhere? Does this mean that one could take advantage of an extra input channel, or possibly two? What would be sacrificed if anything, latency?