Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Cellphones Handhelds Privacy Security

Your Phone Can Be Snooped On Using Its Gyroscope 96

stephendavion (2872091) writes Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. According to the "Gyrophone: Recognizing Speech From Gyroscope Signals" study, the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones.
This discussion has been archived. No new comments can be posted.

Your Phone Can Be Snooped On Using Its Gyroscope

Comments Filter:
  • by Anonymous Coward

    Is it "Gyro" or "Yeero"?

  • by fuzzyfuzzyfungus ( 1223518 ) on Wednesday August 20, 2014 @08:57AM (#47711423) Journal
    Can we just succumb to the inevitable and work on building a list of the parts of a smartphone that can't be used to spy on you?

    I'm thinking 'maybe the battery door'. Any other suggestions?
    • by Anonymous Coward

      They're probably working on the battery door spying technology as we speak.

      • Re: (Score:3, Funny)

        by nxtr ( 813179 )
        The vibrations of your voice cause voltage fluctuations in the battery, and can be reconstruct the image of the suspect from the reflection in the eye of the person across the street.
        • Given that attack [tau.ac.il] where they used the acoustic emissions of a CPU's voltage regulator circuitry to extract an RSA key I'm going to consider that one guilty until proven innocent...
    • by plover ( 150551 ) on Wednesday August 20, 2014 @09:06AM (#47711503) Homepage Journal

      Apple fixed that problem. The iPhone has no battery door, so it can't be removed in case you don't want the phone to spy on you.

    • Re:I give up... (Score:5, Insightful)

      by geekmux ( 1040042 ) on Wednesday August 20, 2014 @09:26AM (#47711667)

      Can we just succumb to the inevitable and work on building a list of the parts of a smartphone that can't be used to spy on you? I'm thinking 'maybe the battery door'. Any other suggestions?

      What's the point of securing any smartphone when all of your activity on the device is captured elsewhere and sold for profit? They don't just count how many times you play your songs. They count how many times you text during the day. They count how many times you click on icons. They count how many seconds you hover over app icons even when you don't buy them in order to market apps catered to your "maybe" whims. Yes, they do this shit. No, it's not called crazy, it's called statistical analysis to the nth degree in order to maximize profits.

      The phone is merely the vehicle. What that vehicle can do all depends on the driver. Unfortunately, we've all been thrown in the back of a telco cab and the driver was told to get lost years ago.

      • by antdude ( 79039 )

        I am so glad I don't own a mobile phone to worry about these issues. :) I do have to worry about other sources though. :(

    • So That must be the reason that Apple made the iPhone battery non removable. It's a security feature!
    • Mine's got a wireless charging pad in it.

      Of course, it's running WebOS, which lets me set up security such that I can require confirmation before an app's allowed to use certain features (eg, GPS), rather than just giving it a blanket 'you're allowed to use GPS whenever you want to'.

      The drawback is that I don't have nearly as many apps available to use, being that it's WebOS. (I still blame those horrible Palm Pre commercials with the stoned albino -- why they didn't bother showing that it supported multit

      • A wireless charging pad? So they can just listen for the power consumption of the CPU with an RF antenna, process the waveforms to extract encryption keys and then hack in via the cellular radio and take information they want?

      • As much as I mourn my HP Touchpad (Oh man did WebOS multitasking curb-stomp Android multitasking at the time and even considerably later); if you are still running WebOS you probably have bigger security issues. The last update for any Pre models was December 2011, and Touchpad models January 2012. That's a long time for a relatively full featured OS to go without any fixing.
    • it will be more dangerous when they figure out how to make your battery explode or electrocute you. when the go from surveillance to attack mode.

    • It won't work. They'll be able to track you through the "hole" you leave by not having a trackable smart phone.
    • by thieh ( 3654731 )
      We probably should stop using cellphones altogether.
    • Battery door? Oh, that thing on the back of the phone. Isn't that that elusive back door I've been hearing so much about? :-p
  • Another summary posted by trainee.
  • by khr ( 708262 ) <kevinrubin@gmail.com> on Wednesday August 20, 2014 @09:09AM (#47711533) Homepage

    the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones

    Yeah, that's why I always stick my phone inside an empty potato chip bag when I'm talking to someone...

  • My phone doesn't have gyroscope, therefore I am safe from people listening in to my conversations.

    "Gee boss, we need to spy on this guy! Any ideas how we can do it?
    "Well he has a smart phone; maybe we can leverage that to our advantage?"
    "Oh, I see what you are getting at; we'll hack the firmware so we can use the oscillations of the GPS to crudely and inaccurately record what he is saying!"
    "Actually, I was thinking we might want to use the attached microphone which is, you know, designed to pick up sound..

  • Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014.

    Why the redundancy? Post must be longer than 100 characters?

  • Comment removed based on user account deletion
  • The paper says... (Score:4, Informative)

    by Anonymous Coward on Wednesday August 20, 2014 @09:24AM (#47711649)

    They are currently able to recognize the spoken digits 1-9 correctly approximately 80% of the time. This is given a training data set from the same speaker and the same phone. Incredibly impressive, especially since it was done from a web browser and requires no special permissions or even knowledge from the user. For those of you that didn't read it. However, James Bond spy tool this is not yet...

    • Something tells me that this could quite easily be fixed by filtering out "noise" from the gyroscopes before presenting it to apps. There can hardly be a use case for this finegrained details from the gyro except this one of course.
    • It would be neat, however, to see gyroscope inputs added to regular audio inputs to improve speech-to-text. This seems to be a nice proof of concept for that.
    • by Pope ( 17780 )

      So the Numbers Station folks aren't out of a job yet!

  • by sacrilicious ( 316896 ) <qbgfynfu.opt@recursor.net> on Wednesday August 20, 2014 @09:37AM (#47711743) Homepage

    Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. According to the "Gyrophone: Recognizing Speech From Gyroscope Signals" study, the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones.

    I can't help but feel like there are gyroscopes involved in this process somehow...

    • Well, they call 'em gyroscopes, but since gyro- implies something spinning, and these things are (as far as I can ascertain) just vibrating, I call 'em accelerometers.

      And real gyroscopes have more purposes than measuring acceleration anyway.

      • The gyroscopes and accelerometers are two different things. The gryoscope measures tilt of the device, like when you play a racing game. The accelerometer measures change in velocity, like when you shake the phone to shuffle a playlist. Two different sensors.

        And no, the gyroscope in your phone does not spin; it is solid state [wikipedia.org].
  • No one will ever bother exploiting this. Neither will anyone bother to exploit the red button attack [slashdot.org] or inferring audio from video recording [slashdot.org]. It's just too tricky to get these working in practice. Even with the gyroscope you get a crummy 100Hz frequency cap with terrible amounts of factors decreasing sound capture quality.
  • http://petapixel.com/2014/08/0... [petapixel.com]

    Good lordy.

    This would be really cool if the privacy implications weren't scary. However, I can't imagine this being useful or practical wide scale. As a targeted attack, that's really scary as fuck.

    • been done for decades using laser on window or hard surface in room by law enforcement and others

      • If you read the article linked, they're doing it with a cellphone camera too.

        Not *great*, mind you, but possible. Thus kind of scary.

        • yes read the article, just saying principles not new and plenty of other ways to "bug" a room without entering. good ol' parabolic microphones can listen through walls from outside at over fifty meters range

  • ... has moved to smartphones.

  • Smartphones have actual microphones. Why use the gyro as a crude microphone when you have a perfectly functioning microphone built into the device already?

    • by Chrisq ( 894406 )

      Smartphones have actual microphones. Why use the gyro as a crude microphone when you have a perfectly functioning microphone built into the device already?

      Because its there [wikiquote.org]

    • The app doesn't use your microphone; or you deny it, or whatever. So the app uses the gyro to figure out what you are saying anyway - you have no idea it can even do this because it doesn't use the microphone. 3rd parties could AUDIT and secure the software for government or corporate use--- and it would still record gyro information.

      A background app could listen constantly even while other apps have the mic if it can background and use the gyro.

      A hacked app with only gyro access...

      Think about the story w

  • by Gothmolly ( 148874 ) on Wednesday August 20, 2014 @11:47AM (#47712697)

    Every app seems to want access to your full memory, location info, camera, microphone and contact list. Why does a flashlight app need all this?

    I carry a phone because I have to for work, and I need something to read while on the crapper, and that's it. People who use all these fancy apps are the product, not the customer.

    • You can thwart this if your phone is rooted. At first I used an app which blocked apps from accessing certain features and data I didn't want them to see, like my location. But then they started to make apps crash when they were blocked this way.

      I'm currently using xprivacy [xposed.info]. It generates fake data for things like location, networks, and sensors. If the app insists on getting my location and I don't give it that permission, it still gets a location. But that location is a random place in the world. S
  • Since a long long time ago (about 50 years now) we've been able to use nearby windows and computer monitors - even picture frames - to pick up sounds inside rooms.

    Why bother with a cell phone if you're trying to get a good audio pickup?

    If you need to isolate a person, it's not a bad choice, but you can also use the other signals your cell gives out or responds to for locating the person precisely, without technically "using" the phone, and thereby alerting the target.

    But, hey, do it the hard way, if you mus

BLISS is ignorance.

Working...