Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Only, IMO, if it's already been designed in and you can hide the power usage (and data-store usage).

That quote was about this Amazon device anyway, which doesn't have power usage or data usage requirements that would be noticed by the average user if recording was only for significant audio. You've jumped from there to cell phones.

The access is blanket given warrants like the FISA verizon one, and there's nothing to stop targeted surveillance like that which we know goes on on gmail/skype/etc accounts when requested. To be clear, I'm not suggesting that cell phones or this device are all constantly recording what we do and transmitting direct to the NSA right now, but that they could in a targeted manner be used to do so if someone became of interest, and that this Amazon device would be a particularly powerful bug given the great microphones, constant power and fixed location in a home.

Re cell phones, I don't think it would be very hard to present a blank screen and wake up only on significant audio to record/broadcast on a hacked phone. I'm sure a paranoid user would eventually notice, but the capability is certainly there - probably that sort of thing is very rare and sophisticated, it's not something I worry about personally, but I do think it is quite possible. If you control the software on the device, I don't see why it seems impossible to you that you'd be able to control the phone completely and use it as an audio bug (except when battery removed etc). You wouldn't even have to rely on faking switch-off - the majority of people leave their phone on and carry it around.

Anything better?

Well, I'm inclined to believe Binney (and others) when they explicitly say cellphones are used as bugs, but here's another example for you of actual use, they are not hard to find:

http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdroppin...



I'm not suggesting that cell phones or this device are all constantly recording what we do and transmitting direct to the NSA right now

Thank you for the clarification, and I apologize if my tone earlier was excessively acerbic - the angle you just mentioned appears to be an undertone surrounding this discussion.

but that they could in a targeted manner be used to do so if someone became of interest

Here's where we diverge: This is an argument that can be applied to any internet-connected device, anywhere, anytime. We're dealing with a group of people that have proven themselves adept at twisting a device's programming to their own ends.

So: Why is this so special? Why are so many people sitting here in this thread slagging on this particular internet-connected mic when most of us carry one with us and work in front of one every single day?

I'm sure I'm not alone in growing weary of hearing the constant "NSA!!" bogeyman brought up anytime a new device featuring a microphone comes out. There's no new information here, no interesting discussion, just the same usual "X might do Y" scaremongering. With the previous paragraph in mind, these concerns ring hypocritical in addition to just hollow.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: