Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons back to advertisers, data which contains sensitive information that state-sponsored actors can easily obtain via a subpoena.
This attack model was brought to light towards the end of 2016 by a team of six researchers, who presented their findings at the Black Hat Europe 2016 security conference in November and the 33rd Chaos Communication Congress held last week.
Their research focuses on the science of ultrasound cross-device tracking (uXDT), a new technology that started being deployed in modern-day advertising platforms around 2014.
uXDT relies on advertisers hiding ultrasounds in their ads. When the ad plays on a TV or radio, or some ad code runs on a mobile or computer, it emits ultrasounds that get picked up by the microphone of nearby laptops, desktops, tablets or smartphones.
These second-stage devices, who silently listen in the background, will interpret these ultrasounds, which contain hidden instructions, telling them to ping back to the advertiser's server with details about that device.
-- submitted from IRC
(Score: 1) by nitehawk214 on Monday January 09 2017, @01:04PM
Why would my phone or laptop just send information to this tracking site on it's own.
Are they forgetting the much harder task of getting malware on every single phone and laptop in existence?
"Don't you ever miss the days when you used to be nostalgic?" -Loiosh
(Score: 2) by MrGuy on Monday January 09 2017, @01:32PM
The idea is not that the phone/laptop does it "on its own." It's to secretly embed "listening" code into web pages (for example, as part of ads). If you have a page containing the javascript open AND an ultrasonic tag plays on your TV, then the javascript will report it.
If your web browser is closed, or you don't have a page containing a tracking script open, your device won't be listening or report anything. But the thing advertisers (initially) and surveillance professionals (eventually) hope is that if you can make both the "listening scripts" sufficiently ubiquitous in web pages, and the "ultrasonic tags" sufficiently widespread in broadcast media, the likelihood is eventually you'll bring A into contact with B often enough for identification to be done.
(Score: 3, Interesting) by nitehawk214 on Monday January 09 2017, @04:20PM
Web pages can activate a microphone? What the fuck?
"Don't you ever miss the days when you used to be nostalgic?" -Loiosh
(Score: 2) by EvilSS on Monday January 09 2017, @05:39PM