![]() That’s exactly the exploit Speak(a)r uses. …the kernel exposes an interface that makes it possible to retask your jacks, but almost no one seems to use it, or even know about it,” wrote Linux sound engineer David Henningsson. “Most of today’s built-in sound cards are to some degree retaskable, which means that they can be used for more than one thing. ![]() ![]() “In addition, we showed that the same setup achieves channel capacity rates close to 1 Kbps in a wide range of frequencies.” “Our experiments demonstrate that intelligible audio can be acquired through earphones and can then be transmitted distances up to several meters away,” wrote researcher Mordecai Guri. This means you can plug your headphones into a seemingly output-only jack and hackers can still listen in. It essentially “retasks” the RealTek audio codec chip output found in many desktop computers into an input channel. I use a switch to control what goes to the speaker set (iMac, iPod, or. ![]() In short, the headphones were nearly as good as an unpowered microphone at picking up audio in a room. I have a set of surround speakers, connected to my iMac through the headphone jack. The PoC, called “Speake(a)r,” first turned headphones connected to a PC into microphones and then tested the quality of sound recorded by a microphone vs. Security researchers at Israel’s Ben Gurion University have created a proof-of-concept exploit that lets them turn headphones into microphones to secretly record conversations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |