Apparently the bad guys can now use a device's ambient light sensor:
That tape over your webcam may not be enough. Researchers at the Massachusetts Institute of Technology (MIT) have highlighted imaging privacy threats enabled by ambient light sensors, in a paper recently published in Science Advances. Device users concerned with security and privacy may be comforted by hardware solutions (shutters) and software permissions restricting webcam use. However, researchers have shown visual information can be gathered via one of the common ambient light sensors installed in many devices. These small sensors usually aren’t shuttered or disabled by users and are typically permission-free on a device level.
Ambient light sensors are categorized as low-risk by device makers and can often be accessed directly by software (or malware) without any permissions or privileges. Nevertheless, previous studies have shown such a rudimentary sensor can provide enough information to infer keystrokes on a virtual keyboard and steal a device PIN, about 80% of the time. The new research shows what an ambient light sensor can do when combined with an active light source component – namely the device' screen.
For their experiments, the MIT researchers used a Samsung Galaxy View 2. This rather old and large (17.3-inch) consumer tablet has its ambient light sensor next to the front-facing (selfie) camera, which is still a very common configuration.
[...] The scientists explained that the ambient light sensor reads the light emitted by the screen shining on a person’s face and being partially blocked by the hand / screen interaction. A whole lot of complicated math, aided by AI and image processing technology, was used by the researchers to deliver their results.
Journal Reference: Imaging privacy threats from an ambient light sensor - Yang Liu, Gregory W. Wornell, William T. Freeman, and Frédo Durand - https://www.science.org/doi/10.1126/sciadv.adj3608
Related: Now That Everyone's Using Zoom, Here Are Some Privacy Risks You Need to Watch Out For
(Score: 4, Insightful) by SomeGuy on Monday February 05 2024, @02:52AM (3 children)
Keep in mind that microphones can reveal a f-ton of information. And you can't just cover up a mic. Even covering them in superglue won't completely block them. I'm not aware of any way to completely inhibit a built in mic without destroying or removing them.
Most microphones don't even have any indicator they are on. One web cam I am familiar with lights up with blue LEDs (ouch! Yuck!) when it is capturing video. But open up an audio tool and only record audio from its microphones... no lights.
(Score: 2, Interesting) by nostyle on Monday February 05 2024, @02:36PM (2 children)
My fix is to run Slackware Linux on chromebooks, which pretty much guarantees that audio will not work. Sure, I can make it work when I'm feeling heroic, but it's more convenient to leave it broken and talk to nobody (that's what phones are for).
For laptops, I use duck tape over the webcams. No light leakage there.
For my iphone SE that the wife makes me carry, I use a tactical rubberband (#82) over the camera lens. Quick to remove for doing photos. Quick to restore. No stick-em to gum up the works, and it helps keep dust off the lens. Serves as a pretty good shock absorber as well.
If you have one of those monster phones with 3 lenses, you're on your own.
--
-Beatles, You Won’t See Me
(Score: 2) by Freeman on Monday February 05 2024, @04:48PM (1 child)
Perhaps one of these monsters would work?
https://www.amazon.com/Grifiti-Silicone-Chemical-Resistant-Backpacking/dp/B087CBS56J [amazon.com]
Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
(Score: 3, Interesting) by cereal_burpist on Tuesday February 06 2024, @03:00AM
They say "adhesive", but they're really just static-cling window decals. And it supports a good cause, IMHO.