- Get link
- X
- Other Apps
And as soon as security services, large corporations and hackers do not listen to us and do not look through, using microphones and cameras built into all sorts of gadgets and computers! Supporters of the "conspiracy theories" have long pasted the camera's eyehole on their laptops to avoid becoming a victim of cyber-bullying, but you can not escape from the ubiquitous technologies. Security experts from Israel demonstrated that with the help of a vulnerability in the Realtek codec, attackers can overhear us through normal headphones that are not equipped with a microphone.
The fact that the headphones are able to act as a microphone has been known for a long time. It's not such an amazing fact. However, sticking these headphones would have to be in the microphone jack, and it's unlikely that hackers could take advantage of this your "lifhak". Experts from Israel proved that any headphones can be hacked, remotely turning them into a microphone for listening to the victim. Of course, this does not mean that it's time to throw your headphones in the trash and start making a cap from the foil, but once again makes you think about the imperfection of modern technology in terms of security.
In fact, hacking did not have headphones, but the computer to which they are connected. The developers wrote a small virus Speake (a) r (a play of words from the "speaker" and "ear"), using the exploit found in the codecs produced by Realtek (technology is found in the vast majority of motherboards). The attacked computer programmatically swaps the headphone and microphone ports, after which the ordinary headphones "turn into a microphone with an" easy movement of the hand. " And the quality of the transmitted audio - quite high, which allows you to hear people who are at a distance of 6-7 meters.
Of course, this is just a harmless experiment and has not yet been attempted to reproduce it on computers using technologies other than Realtek. In addition, researchers are not sure that such viruses exist outside their laboratory. But, as we all understand very well, if such an opportunity exists, then for sure someone has long and very successfully used it for their own mercenary purposes.
The article is based on materials
- Get link
- X
- Other Apps
Comments
Post a Comment