This website uses cookies.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.

I agree
Learn More
Great Geek Gifts in the Technabob Shop!Get Technabob Daily: Join our Mailing List! | Follow Us: Facebook | Twitter
subscribe to our rss feedsubscribe via e-mailfollow technabob on twittertechnabob facebook fan pageGoogle+follow us in feedly
Follow Us:

Gyroscopes in Mobile Devices Can Act as Microphones: Censor that Sensor

by Lambert Varias

Gyroscopes can be found in most modern mobile devices. They’re meant to help in motion-sensing, but a recent paper by researchers Yan Michalevsky, Dan Boneh and Gabi Nakibly shows that these sensors can also act as microphones. According to the researchers, what makes this accidental feature extra scary is that mobile apps generally don’t ask the user’s permission to access gyroscope data.

gyroscope-as-microphone-research-by-Yan-Michalevsky-Dan-Boneh-Gabi-Nakiblyzoom in

Put simply, the gyroscopes found in many mobile devices have a very small mass suspended inside it. When your device is moved, the mass is moved as well, which helps the sensor pick up on changes in orientation or direction. But in their paper Gyrophone: Recognizing Speech from Gyroscope Signals, Michalevsky, Boneh and Nakibly show that these motion sensors can also pick up sound. Again, since you wouldn’t know if an app is accessing your device’s gyroscope, you also would not be able to tell if someone’s recording or listening in on you through the sensor.

According to Wired, Android users are more vulnerable to this hack than iOS users because of the difference in the rates at which their gyroscopes sense vibrations. Google is said to be aware of the vulnerability and is hopefully working on a way to patch it.

While the researchers concede that the data from a single gyroscope is barely useful by itself, speech processing algorithms or software can extract usable information from that crude source. It could be a vocal or speech pattern that gives away the identity of a person, ambient sound that narrows down the target’s location or just plain sensitive information spoken out loud. Someone hacking into multiple nearby devices could also get considerably better results.

You can get a copy of Michalevsky, Boneh and Nakibly’s paper from the Stanford Security Research page. That page also holds a link to the Android app that the researchers made to sample the gyroscopes of the mobile devices they tested.

[via Engadget & Wired]

Comments are closed for posts older than 90 days.

Recent Posts

This Strandbeest Inspired Bike Is a Slow Ride

This Strandbeest Inspired Bike Is a Slow Ride

Bose Wants Kids to Build Their Own Speakers

Bose Wants Kids to Build Their Own Speakers

Pizzeria Uses Robots to Prepare Pies, Bakes Them During Delivery

Pizzeria Uses Robots to Prepare Pies, Bakes Them During Delivery

Labyrinth Funko POP! Figures Won\

Labyrinth Funko POP! Figures Won't Steal Your Baby Brother

Ghostbusters Hamburgers: I Ain\

Ghostbusters Hamburgers: I Ain't 'Fraid of No Clogged Artery

More from Awesomer Media...

The Awesomer Logo MightyMega Logo 95octane Logo