This website uses cookies.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.

I agree
Learn More
Great Geek Gifts in the Technabob Shop!Get Technabob Daily: Join our Mailing List! | Follow Us: Facebook | Twitter
subscribe to our rss feedsubscribe via e-mailfollow technabob on twittertechnabob facebook fan pageGoogle+follow us in feedly
Follow Us:
Cool Gadgets, Gizmos, Games and Geek Stuff on Technabob

Gyroscopes in Mobile Devices Can Act as Microphones: Censor that Sensor

by Lambert Varias

Gyroscopes can be found in most modern mobile devices. They’re meant to help in motion-sensing, but a recent paper by researchers Yan Michalevsky, Dan Boneh and Gabi Nakibly shows that these sensors can also act as microphones. According to the researchers, what makes this accidental feature extra scary is that mobile apps generally don’t ask the user’s permission to access gyroscope data.

gyroscope-as-microphone-research-by-Yan-Michalevsky-Dan-Boneh-Gabi-Nakiblyzoom in

Put simply, the gyroscopes found in many mobile devices have a very small mass suspended inside it. When your device is moved, the mass is moved as well, which helps the sensor pick up on changes in orientation or direction. But in their paper Gyrophone: Recognizing Speech from Gyroscope Signals, Michalevsky, Boneh and Nakibly show that these motion sensors can also pick up sound. Again, since you wouldn’t know if an app is accessing your device’s gyroscope, you also would not be able to tell if someone’s recording or listening in on you through the sensor.

According to Wired, Android users are more vulnerable to this hack than iOS users because of the difference in the rates at which their gyroscopes sense vibrations. Google is said to be aware of the vulnerability and is hopefully working on a way to patch it.

While the researchers concede that the data from a single gyroscope is barely useful by itself, speech processing algorithms or software can extract usable information from that crude source. It could be a vocal or speech pattern that gives away the identity of a person, ambient sound that narrows down the target’s location or just plain sensitive information spoken out loud. Someone hacking into multiple nearby devices could also get considerably better results.

You can get a copy of Michalevsky, Boneh and Nakibly’s paper from the Stanford Security Research page. That page also holds a link to the Android app that the researchers made to sample the gyroscopes of the mobile devices they tested.

[via Engadget & Wired]

Comments are closed for posts older than 90 days.

More from Awesomer Media...

theawesomer logo
Prometheus SHADO Pack SAW Robotic Worm Xenia Rubinos Live Lars Von Trier: Deconstructing Cinema 95octane logo
Review: 2016 GMC Canyon SLE Diesel 2017 Ford Raptor Price Guide Leaked The Best BMW M on the Market Has a Growl for the Ages Matech Ford GT1 Racecar Turns up on eBay mightymega logo
Quantum Mechanix 2016 Spaceship Scale Models Concept Trailer for Gene Roddenberry Biopic “The Pilot” 3A Toys x Hasbro Transformers G1 Optimus Prime Action Figure DC Collectibles Batman: The Animated Series Batman Expression Pack