Hacker News new | past | comments | ask | show | jobs | submit login

Yes, there are ways to extract signal from almost anything.

Eavesdropping on either the output of the headphones or the audio data before it leaves the computer/phone is the same for wired vs Bluetooth. The latter seems to be the mode used in the (pretty coo) hack you posted - it's software attacking the Realtek chip, which must be driven by the wire, so exploiting the quasi-equivalence/reversability of speakers/microphones and the back signal from the speaker diaphragms.

This still requires access to get malware onto the device itself, and I'm more considering 'drive-by' or remote attacks in my comment.

To do this against a ~1m wire with millivolt signals without putting a clamp around the wire seems pretty tough in contrast to cracking a signal that is explicitly broadcast with not great security. Not only that, while eavesdropping the signals on the headphone wires will yield only a conversation in the room, which can be much more easily gathered directly, cracking a Bluetooth 2-way comms channel will yield much greater access to the device.

For most of us, neither is a concern, but it certainly is for people who do have real security needs, e.g., I've read that the current VPOTUS specifically uses wired headphones for this reason. Many people who also work with Classified information, Controlled Unclassified Information (CUI), or just with business security issues have the same need. Failing to produce a device with this capability is a failure to address a key and leading market.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: