Remix.run Logo
Malware can turn off webcam LED and record video, demonstrated on ThinkPad X230(github.com)
668 points by xairy 15 hours ago | 380 comments
sbarre 14 hours ago | parent | next [-]

I thought the whole point of these camera LEDs was to have them wired to/through the power to the camera, so they are always on when the camera is getting power, no matter what.

Having the LED control exposed through the firmware completely defeats this.

542458 14 hours ago | parent | next [-]

They are hardwired on Macbooks. From Daring Fireball, quoting an email from an Apple engineer.

> All cameras after [2008] were different: The hardware team tied the LED to a hardware signal from the sensor: If the (I believe) vertical sync was active, the LED would light up. There is NO firmware control to disable/enable the LED. The actual firmware is indeed flashable, but the part is not a generic part and there are mechanisms in place to verify the image being flashed. […]

> So, no, I don’t believe that malware could be installed to enable the camera without lighting the LED. My concern would be a situation where a frame is captured so the LED is lit only for a very brief period of time.

https://daringfireball.net/2019/02/on_covering_webcams

nine_k 6 hours ago | parent | next [-]

That's backwards.

The LED should be connected to camera's power, or maybe camera's "enable" signal. It should not be operable via any firmware in any way.

The led also has to be connected through a one-shot trigger (a transistor + a capacitor) so that it would light up, say, for at least 500 ms no matter how short the input pulse is. This would prevent making single shots hard to notice.

Doing that, of course, would incur a few cents more in BOM, and quite a bit more in being paranoid, well, I mean, customer-centric.

jdblair 4 hours ago | parent | next [-]

or, you can have a physical switch, like the Framework. that also hits your BOM but its not complex!

oneshtein 3 hours ago | parent | next [-]

You can buy/print and stick a physical «webcam cover»[1] manually on your notebook or phone.

My current notebook, manufactured in 2023, has very thin bar on top of screen with camera, so I need a thin, U-like attachment for the switch, which is hard to find.

[1]: https://www.printables.com/model/2479-webcam-cover-slider

ddalex 3 hours ago | parent [-]

Am I the only one that is not worried at all about the camera and super concerned about microphones ? The camera may see me staring into the screen, woo hoo. The microphones will hear everything I discuss, incl. confidential information.

There is no physical microphone cover there, is it ?

lukan an hour ago | parent | next [-]

Sound is usually more sensitive, yes. But even if there is a physical switch on the laptop, only very exotic smartphones have them.

Also, loudspeakers can act as microphones, too.

In other words, paranoia gets exhausting in modern times.

(And my smartphone has a replacable battery for that reason to at least sometimes enjoy potentially surveillance free time)

MarcusE1W 44 minutes ago | parent [-]

My Pinephone has a switch for the microphone and also my Pinebook Pro laptop. But I also would agree that this is exotic hardware.

lukan 20 minutes ago | parent [-]

"But I also would agree that this is exotic hardware."

No shit. How is the current state btw?

I suppose still not ready to be a daily driver to replace my normal phone?

jdblair 3 hours ago | parent | prev | next [-]

The Framework has a physical microphone switch next to the camera switch.

klausa 3 hours ago | parent | prev | next [-]

Modern (2019-ish? forwards?) MacBooks have physical disconnect for microphones when the lid is shut.

jack_arleth 2 hours ago | parent [-]

Framework laptops have the same solution.

camgunz an hour ago | parent | prev | next [-]

A picture of you with the subject "I know what you were looking at when I took this picture of you" is pretty good blackmail--I think there's an active campaign doing this even.

ddalex an hour ago | parent [-]

This would've been blackmail 20 years ago.... nowadays it's just "of course you know, I shared my OF likes publicly", will not even raise an eyebrow; or perhaps I'm living in too bohemian society circles

ashoeafoot an hour ago | parent | prev | next [-]

Your speakers are a microphone ..

spacemanspiff01 an hour ago | parent | prev | next [-]

I honestly like the physical switch on the framework, which disconnects the microphone/webcam fully.

djtango 2 hours ago | parent | prev | next [-]

Yes I really wish we could have a physical switch for device mic

ykonstant 2 hours ago | parent | prev [-]

As someone who often speaks gibberish to myself due to ptsd, if someone recorded me in my room they could convince anyone I am utterly insane, beyond any hope. It is a great way to blackmail people with coprolalia or other verbal tics.

And yeah, if they had access to my webcam, they would just see a guy staring into the screen or walking back and forth in the room.

SiVal 4 hours ago | parent | prev | next [-]

Would a bit of Post-It Note (for minimal adhesion) damage the screen coating if left on most of the time? Would even that much thickness stress the screen when opened and closed thousands of times? Is there a better (self-service) material?

cuu508 38 minutes ago | parent | next [-]

> Would a bit of Post-It Note (for minimal adhesion) damage the screen coating if left on most of the time?

Possible, I have one IPS monitor with a spot on screen where the color is pale. I had a post-it note there and I guess something bad happened when I tore it off.

pcblues an hour ago | parent | prev [-]

Plastic slide covers that stick on are pretty cheap if your laptop doesn't already have one. I also think that the open microphone issue is a greater problem, especially with the current ability of speech-to-text, but what you utter may not be as important as being seen "doing a Toobin" during an online meeting. YMMV :) (I won't expand that acronym!)

goodpoint 2 hours ago | parent | prev [-]

This is the right solution. And a hardware switch cost is completely negligible in a $1000 laptop.

beAbU 3 hours ago | parent | prev | next [-]

Yet some laptops (Thinkpads ironically) come with a built in camera shutter that's entirely mechanical.

throw646577 4 hours ago | parent | prev [-]

> The LED should be connected to camera's power, or maybe camera's "enable" signal.

Wiring it in like this is suboptimal because this way you might never see the LED light up if a still photo is surreptitiously captured. This has been a problem before: illicit captures that happen so quickly the LED never has time to warm up.

Controlling the LED programmatically from isolated hardware like this is better, because then you can light up the LED for long enough to make it clear to the user something actually happened. Which is what Apple does -- three seconds.

nine_k 3 hours ago | parent | next [-]

Pray read the third paragraph of my reply :) It specifically mentions a way to make the LED be lit for long enough.

throw646577 2 hours ago | parent [-]

Which is not an adjustable method -- without changing the hardware design later in production to just tweak a delay -- and surely causes the LED to slowly fade out?

atoav 3 hours ago | parent | prev | next [-]

The mentioned one shot circuit does precisely that, in hardware for less cost and 100% non-overridable.

The only time that isolated hardware approach is benefitial in terms of costs would be when you already have to have that microcontroller there for different reasons and the cost difference we are talking about is in the order of a few cents max.

throw646577 2 hours ago | parent [-]

Well there is a microcontroller there, isn't there? For the camera.

atoav an hour ago | parent [-]

But is it isolated? If you can update its Firmware from the computer it isn't.

rightbyte 3 hours ago | parent | prev | next [-]

You can design a simple circuit such that both long and short pulses light up the led for atleast 500ms. There is no tradeoff needed to be made at all.

kirkules 3 hours ago | parent | prev [-]

I mean can't you just have the input signal to the light be a disjunction of signals? So it's on if the camera is on OR if some programmatic signal says turn it on?

I don't see why they should be mutually exclusive

aftbit 14 hours ago | parent | prev | next [-]

>The actual firmware is indeed flashable, but the part is not a generic part and there are mechanisms in place to verify the image being flashed.

That might make it harder to develop a hack, but one would hope that if the hardware team tied the LED to a hardware signal, it would not matter if the firmware were reflashed.

varenc 14 hours ago | parent | next [-]

I believe that it’s not literally hardwired in the sense that powering up the camera also powers up the camera LED, and instead this relies on logic in the hopefully un-flashable camera+LED firmware. Someone correct me if I’m wrong.

You need some logic to enforce things like a minimum LED duration that keeps the LED on for a couple seconds even if the camera is only used to capture one brief frame.

I have a script that takes periodic screenshots of my face for fun and I can confirm the LED stays on even if the camera only captures one quick frame.

MaxikCZ 14 hours ago | parent | next [-]

A capacitor can hold enough charge to power led for noticable amount of time even if powered for a brief moment, no logic needed

squarefoot 12 hours ago | parent | next [-]

I don't think they would waste a high value capacitor just to keep a led lit for longer, also a led directly lit by a capacitor would be noticeable by slowly dimming when the capacitor discharges. It's more likely that the signal driving the led comes out of a monostable implemented in code: pin_on() drives the led on; pin_off() waits n secs then drives the led off.

altairprime 9 hours ago | parent [-]

This is Apple, so that assertion isn’t guaranteed valid like it would be for non-enterprise HP or Lenovo. They absolutely would invest in a capacitor if that’s what it takes, as they are maximally focused on camera privacy concerns and have made a point of that in their security marketing over time; or else they wouldn’t be allowing hardware security engineers to brag about it, much less talk publicly about it, at all.

EDIT: It’s not just a capacitor, it’s a full custom chip, that can’t be software-modified, that keeps the light on for 3 seconds. https://news.ycombinator.com/item?id=42260379

HeyLaughingBoy 7 hours ago | parent | prev | next [-]

Logic on an already existing ASIC is going to be cheaper than a capacitor.

MrDrMcCoy 3 hours ago | parent [-]

This is counter-intuitive enough to warrant further explanation.

RA2lover 13 hours ago | parent | prev [-]

The trick is to keep using the camera until that capacitor is discharged. I'm pretty sure most cameras can run at voltages below a LED's forward voltage nowadays.

axoltl 13 hours ago | parent | prev | next [-]

I happen to have some first-hand knowledge around the subject! In 2014 someone did a talk[0] on disabling the camera on some older Macbooks. It was fairly trivial, basically just reflashing the firmware that controlled the LED. I worked on the security team at Apple at the time and in response to this I attempted to do the same for more modern Macbooks. I won't go into the results but the decision was made to re-architect how the LED is turned on. I was the security architect for the feature.

A custom PMIC for what's known as the forehead board was designed that has a voltage source that is ALWAYS on as long as the camera sensor has power at all. It also incorporates a hard (as in, tie-cells) lower limit for PWM duty cycle for the camera LED so you can't PWM an LED down to make it hard to see. (PWM is required because LED brightness is somewhat variable between runs, so they're calibrated to always have uniform brightness.)

On top of this the PMIC has a counter that enforces a minimum on-time for the LED voltage regulator. I believe it was configured to force the LED to stay on for 3 seconds.

This PMIC is powered from the system rail, and no system rail means no power to the main SoC/processor so it's impossible to cut the 3 seconds short by yoinking the power to the entire forehead board.

tl;dr On Macbooks made after 2014, no firmware is involved whatsoever to enforce that the LED comes on when frames could be captured, and no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

0: https://www.usenix.org/system/files/conference/usenixsecurit...

ohhnoodont 9 hours ago | parent | next [-]

There seems to be widespread anxiety regarding cameras, but hardly anyone ever talks about microphones. Are conversations not much more privileged information than potentially seeing someone in their underwear?

jamesmotherway 9 hours ago | parent | next [-]

"All Apple silicon-based Mac notebooks and Intel-based Mac notebooks with the Apple T2 Security Chip feature a hardware disconnect that disables the microphone whenever the lid is closed. On all 13-inch MacBook Pro and MacBook Air notebooks with the T2 chip, all MacBook notebooks with a T2 chip from 2019 or later, and Mac notebooks with Apple silicon, this disconnect is implemented in hardware alone." [1]

[1] https://support.apple.com/guide/security/hardware-microphone...

KennyBlanken 8 hours ago | parent | next [-]

That's what they said about the first gen Facetime cameras. "oooh don't worry, it's controlled in hardware!"

We have no way of verifying that anything they said in that document is true.

kimixa 5 hours ago | parent [-]

It's clear Apple define "Hardware" as "Not using the main CPU". They've pretty much admitted it's firmware based, otherwise the T2 chip simply wouldn't be involved to be mentioned.

swiftcoder 4 hours ago | parent [-]

The T2 chip is mentioned in the quoted passage as an indicator of the architecture version, not necessarily an indicator that the T2 chip is directly involved

ohhnoodont 7 hours ago | parent | prev [-]

Obviously the camera is also 'disabled' when the lid is closed regardless of the controlling circuitry. So while that's a good feature, it's not relevant.

qingcharles 9 hours ago | parent | prev | next [-]

Yes, photos of naked people are used to extort them (usually into just paying the holder to delete them).

https://news.ycombinator.com/item?id=42261730

ohhnoodont 7 hours ago | parent [-]

This raises a different but related question. In what world should a victim of a crime be extorted for doing innocent things in their home. If a peeping tom took a photo though a window, could that be used to extort someone?

When people are extorted for these kinds of things it's usually catfishing that leads to sexual acts being recorded. That's not related to cybersecurity.

pfix 4 hours ago | parent [-]

Fear of harrasment. You don't want your coworkers see you naked, do you?

edit: s/baked/naked/ :D

sneak 3 hours ago | parent | prev | next [-]

They are, but people aren’t scared of those because they can’t see them staring at them.

Nursie 9 hours ago | parent | prev [-]

Depends what your threat model is?

Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby. But naked images of Abby can head off into the ether and be propagated more or less forever, turn up on hate sites, be detrimental to careers etc.

If your threat model is leaking company secrets then sure, microphone bad, as is anything having access to any hardware on your machine.

So sure, maybe people ought to be more concerned about microphones as well, rather than instead.

ohhnoodont 7 hours ago | parent | next [-]

My point is that the threat model is backwards. The threat associated with a camera is the least severe compared to anything else a malicious person could do with access to your computer. Recored conversations, chats and email, browsing history, etc are all much more likely to result in harm if leaked than a recording of you innocently in your home.

> Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby.

That destroys families, standing within a community, and very often careers.

Nursie 6 hours ago | parent [-]

I don't think it is backwards, personally. The threat of public humiliation, and the capability for someone to spy on what you do in your own home, is worse with the camera.

> chats and email, browsing history, etc are all much more likely to result in harm if leaked than a recording of you innocently in your home.

This is far less of an intrusion for most people than recording what they are actually doing in their own home IRL. People know that information can be hacked, they don't expect and react quite differently to someone actually watching them.

> That destroys families, standing within a community, and very often careers.

Yes, but it doesn't stay on the internet forever in quite the same way.

Now I get to some extent what you're saying - aren't the consequences potentially worse from other forms of information leak?

Maybe. It depends on how you weight those consequences. I'd put (for example) financial loss due to fraud enabled by hacking my accounts as far less important than someone spying on me in my own home. Even if they didn't use that to then extort me, and were using the footage for ... uh ... personal enjoyment. I think a lot of people will feel the same way. The material consequences might be lesser, but the psychological ones not so much. Not everything is valued in dollars.

ohhnoodont 5 hours ago | parent [-]

I think we may just be bumping into cultural differences here. I grew up in a household were being naked around family members was common. I spend time in clothing-optional spaces. I rarely draw the blinds on my windows, etc. I'm not concerned with what other people think in this way and such images could never be used to extort me. Consider the case of Germany - people there are extremely concerned about their privacy and data protection. At the same time public nudity is an entrenched cultural norm.

It's also known that people are not very good at assessing risk. People are more word about dying at the hands of a serial killer than they are of dying in a car crash or slipping in the shower. I feel you're underplaying the psychological harm of having all of your data crawled through by a creep (that would include all of your photos, sites visited, messages sent, everything).

All I can really say is that if someone gained access to my machine, the camera would be the least of my concerns. That's true in nearly every context (psychological, financial, physical, etc).

rocqua 4 hours ago | parent | next [-]

Empirically, most low level extortion does seem to be about leaking video. I would see a threat model based on 'criminal wants to extort me for money'. As more reasonable than 'creep wants to look through my computer for creeping'. And it seems like extortion focusses on video, so that is the bigger threat. Even if it is less invasive.

I presume the reason behind this is that video is much more likely to be re-shared. Sending bob a zip of someone's inbox is unlikely to be opened, and even less likely to be shared with strangers. But send bob a video of Alice, and he might open it. Heck, he might not know what the video is until he opens it. So even if he is decent, he might still see it. And if he is less decent and shares it, strangers are much more likely to actually view it.

Nursie 4 hours ago | parent | prev [-]

I think, though am prepared to be wrong, that you'll probably find yourself in the minority there.

It's not just about nudity and extortion, but someone having access to watch you, whenever they feel like, in your safe space. That sense of violation that people also feel when (for instance) they have been the victim of burglary - the missing stuff is often secondary to the ruined sense of security. There's a vast difference between leaving your curtains open and having someone spying on you from inside your own home.

Is it rational to put this above other concerns? That's a whole different debate and not one I'm particularly interested in. But it explains why people are concerned about cameras over 'mere' data intrusion.

hunter-gatherer 8 hours ago | parent | prev | next [-]

I'm not arguing a point here, but I'm curious what the actual number of instances exist where someone is naked or in some other extortionate way (accidently of course) potentially exposed from the position of their webcam. I too would be much more concerned about my microphone, where I know one had conversations that in front of or next to my machine that I wouldn't want "out there". In terms of where my camera is, I woukd imagine they would catch me picking my nose every so often but that's about it.

rocqua 4 hours ago | parent [-]

People watch porn on their laptops. Even just your orgasm face would be embarrassing for most people.

joeblubaugh 8 hours ago | parent | prev [-]

> Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby.

This isn't true at all, even for private citizens. Your friends, parents, children, and colleagues are all likely to care.

Nursie 7 hours ago | parent [-]

It's very limited, it's certainly not going to be passed around like naked pictures could be.

rubatuga 12 hours ago | parent | prev | next [-]

Thanks, this is the reason I browse Hacker News

II2II 9 hours ago | parent | prev | next [-]

> and no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

I may be the oddball here, but that 3 second duration does not comfort me. The only time I would notice it is if I am sitting in front of the computer. While someone snapping a photo of me while working is disconcerting, it is not the end of the world. Someone snapping photos while I am away from the screen is more troublesome. (Or it would be if my computer was facing an open space, which it doesn't.)

axoltl 7 hours ago | parent | next [-]

Right, so this is all defense in depth. That LED is sort of the last line of defense if all others have failed, like:

The exploit mitigations to prevent you from getting an initial foothold.

The sandboxing preventing you from going from a low-privileged to a privileged process.

The permissions model preventing unauthorized camera access in the first place.

The kernel hardening to stop you from poking at the co-processor registers.

etc. etc.

If all those things have failed, the last thing to at least give you a chance of noticing the compromise, that's that LED. And that's why it stays on for 3 seconds, all to increase the chances of you noticing something is off. But things had to have gone pretty sideways before that particular hail-mary kicks in.

jstanley 8 hours ago | parent | prev | next [-]

OK, but then what? Leave the LED on for 24 hours after you've captured a single frame? At that point the LED isn't really indicating camera usage because you'll just get used to seeing it on all the time whether the camera is in use or not.

tehjoker 8 hours ago | parent | prev [-]

It's strange that none of these companies will include a closable cover for the camera. I got one aftermarket. It is very reassuring since no hacking or accidental misclicks on my part can move the cover.

mkl 8 hours ago | parent | next [-]

I've seen HP desktops that have a closeable camera cover, and Lenovo does on some ThinkPads [1], so probably others do too. Laptops usually have very little depth available in the screen part though, which is why most laptop cameras are crappy (exceptions include Surface Pro and Surface Book, which have more depth available and so much better cameras than most, but no cover - at least their camera light is not software controlled).

[1] https://www.businessinsider.com/lenovo-thinkshutter-laptops-...

sunnybeetroot 8 hours ago | parent | prev | next [-]

I had a closable cover and someone shut my laptop with enough force that the cover caused the screen to break. Be careful when closing.

nanomonkey 4 hours ago | parent | prev | next [-]

I also purchased a cover for mine, although in a pinch, the removable stickers on fruit work well.

whartung 7 hours ago | parent | prev | next [-]

I have a sticky piece of post it note more or less permanently affixed over my camera.

throwaway2037 4 hours ago | parent [-]

I can remember when someone spotted tape over Zuckerberg's laptop camera. Ref: https://www.theverge.com/2016/6/21/11995032/mark-zuckerberg-...

cozzyd 5 hours ago | parent | prev [-]

My Thinkpad does.

PicardsFlute 12 hours ago | parent | prev | next [-]

Thanks for posting this interesting tidbit! I find this kind of knowledge absolutely fascinating!

int_19h 8 hours ago | parent | prev | next [-]

Thank you for your work on this! I wish some other large companies took privacy that seriously.

KennyBlanken 8 hours ago | parent | prev | next [-]

I've seen a million people parroting "oh now apple fixed it!" and not a single person who has actually verified/proved it. Go on, show my any third party security researcher who has verified this claim via examining the actual hardware.

You'll pardon us all if we don't really believe you, because a)there's no way for any of us to verify this and b)Apple lied about it before, claiming the LED was hard-wired in blah blah same thing, except it turned out it was software controlled by the camera module's firmware.

axoltl 6 hours ago | parent | next [-]

I'd love for a third party to verify the claim! I'm just giving you an overview of the work that went into making this a thing, knowing full well you have absolutely no reason to trust me.

The LED being "hard-wired" is a tricky statement to make, and I actually wasn't aware Apple has publicly ever made a statement to that effect. What I can say is that relying on the dedicated LED or "sensor array active" signal some camera sensors provide, while technically hard-wired in the sense there is no firmware driving it, is not foolproof.

trogdor 7 hours ago | parent | prev [-]

> Apple lied about it before, claiming the LED was hard-wired in blah blah same thing, except it turned out it was software controlled by the camera module's firmware.

Source?

jorvi 9 hours ago | parent | prev | next [-]

I assume you're not longer working on it, but why not just wire it so that:

- The LED is in parallel, but with the sensor voltage supply, not the chip

- Camera sensor idle voltage = low voltage for the LED (be it with stepping if needed)

- Camera sensor active voltage = high voltage for the LED (again, stepping if needed)

- little capacitor that holds enough charge to run the LED for ~3 seconds after camera goes back to idle voltage.

Good luck hacking that :)

axoltl 6 hours ago | parent | next [-]

That's basically how this works, but manufacturing electronics at a massive scale requires some more flexibility. For example, capacitors have a pretty large tolerance (sometimes +/- 20%) and LEDs have quite a bit of variety in what voltages they'll work at. So for some people the LEDs might last 3 seconds, for some they might last 5s. Using a capacitor also means the LEDs will fade slowly instead of just turning off sharply.

If the LEDs come from a different supplier one day, who is going to make sure they're still within the spec for staying on for 3 seconds?

(And yes, I have long since parted ways with Apple)

Edit:

And to add on: That capacitor needs time to charge so now the LED doesn't actually come on when the sensor comes on, it's slightly delayed!

shiroiushi 4 hours ago | parent | prev [-]

You can't drive an LED that way in production electronics: you need to use an LED driver circuit of some kind to ensure the LED has constant current, and also to protect against failure modes. Also, a capacitor large enough to power a daylight-visible LED for 3 seconds is not as "little" as you're thinking; there's likely not enough space in a laptop lid for one of those. A driver circuit would be smaller and thinner.

Agreed, however, that the LED should be controlled by the camera sensor idle vs. active voltage.

Mistletoe 12 hours ago | parent | prev [-]

Thank you for doing this.

aftbit 13 hours ago | parent | prev [-]

See then it's not hardwired at all. It is equally vulnerable to a reflash. Apple just did hardware security (i.e. signed firmware) better and also are relying on security through obscurity (its not a publicly available part).

ndiddy 13 hours ago | parent | prev | next [-]

The context from the article the parent comment linked is that Mac webcams made prior to 2008 both had the camera LED controlled in firmware and didn't verify the camera firmware blob when it was downloaded into the camera's RAM. The quote you're replying to simply says that Apple solved these security issues by tying the LED to a hardware signal AND verifying the camera firmware blob. The result is still that there's no way to turn on the webcam without making the LED light up.

danielheath 13 hours ago | parent | prev | next [-]

AFAIK iOS devices use a tiny firmware on the camera and a larger one on the secure enclave chip.

If you successfully compromise the host OS and also the secure enclave firmware, that might be enough to let you turn on the camera (without vsync) and reconstruct the correct image via later analysis... but at that point you have committed tens of millions to the hack (so you'd better not overuse it or it'll get noticed & patched).

pclmulqdq 12 hours ago | parent | prev [-]

Many complex chips have GPIO signals rather than hardwired outputs. That way you can select any [5-10] of [20-100] functions for each pin. As a result, things that you think should be hardwired are controlled by firmware.

makeitdouble 7 hours ago | parent | prev | next [-]

While Apple made a laudable effort in this design, sadly it requires thoughtful care and design at every iteration. Typically the iPhone team couldn't pull it off and the only official claim is for macbooks.

I think it's simpler to assume that most devices can be hacked and the LED indicator isn't infailable than to always keep in mind which device lines are supposed to be safe and which ones aren't.

danieldk 4 hours ago | parent [-]

Apparently it was purely in software on iPhone/iPad. However, starting with the iPhone 16 and M4 iPad Pro, the LED indicator is rendered by a separate secure exclave:

https://www.tomsguide.com/phones/iphones/iphone-16s-a18-chip...

https://mastodon.social/@_inside/112552696723119626

jonplackett 13 hours ago | parent | prev | next [-]

I wonder how quickly it turns on/off as per Gruber’s worry - if you just record a single frame would it even be visible if looking right at it?

Tempest1981 12 hours ago | parent [-]

Below, axoltl writes:

> no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

https://news.ycombinator.com/item?id=42260379

dkga 5 hours ago | parent | prev | next [-]

Do you know if the same occurs in iPhones? That was always my assumption, but seeing a Mac-only response makes me wonder if it is addressing a Mac/only question or if it’s applicable only to Macs.

accrual 9 hours ago | parent | prev | next [-]

> My concern would be a situation where a frame is captured so the LED is lit only for a very brief period of time.

Maybe enable a pre-charged capacitor to the LED whenever the circuit is activated? A "minimum duty cycle" for the LED might help solve this.

wseqyrku 13 hours ago | parent | prev [-]

Yeah, the camera needs a physical lid.

connicpu 14 hours ago | parent | prev | next [-]

An indicator light hardwired is nice but I apparently can't trust hardware manufacturers to design it properly. My work laptop (HP Dragonfly) has a physical blocker that closes over the camera when I haven't explicitly pressed the button that enables the camera. The blocker is black and white stripes so it's very obvious when it's covering the sensor. This should absolutely be the security standard we all strive for with camera privacy.

aendruk 11 hours ago | parent | next [-]

> The blocker is black and white stripes

On my ThinkPad it’s instead painted with a red dot. Because, obviously, the conventional meaning of a red dot appearing on a camera is “not recording”.

BuildTheRobots 8 hours ago | parent | next [-]

Not just the weird meaning, but on my last Thinkpad the red dot and the slightly red glean of the camera lens look surprisingly like each other. Even worse I managed to get the cover in a position where it looked like it was closed, but the camera could still see.

d1sxeyes 3 hours ago | parent | prev [-]

Same on my Dell Latitude. Seems a very odd design decision. They've also centrally aligned the switch so that it's not immediately obvious from the switch position whether the cover is iver the lens or not. Super annoying.

dole 12 hours ago | parent | prev | next [-]

The Dell Latitude business laptops now have a wired led and wired switch. Besides the white led, there’s no indication which is on or off, and I don’t trust any of the software or firmware chain to be reliable. (score one for macs being transparent and prescient)

shiroiushi 4 hours ago | parent | next [-]

Dell should go back to the basic design of the Latitude E6400, but with modern electronics and screen of course, and drop the optical drive. The keyboard on that laptop was fantastic, and the single captive screw on the back panel was great for serviceability.

jorvi 9 hours ago | parent | prev [-]

For some inexplicable reason Dell has chosen to mark the button as "mute mic" (mic icon + X). So if the LED on the keyboard is lit up, the microphone is off, or rather, the microphone muting is on on. Brilliant design.

neuralRiot 13 hours ago | parent | prev | next [-]

Probably the camera “power” is always on as any other microcontroller on the same board, but is only active when called through the control bus or an interrupt, having an LED tied to the power rail would keep it on all the time whenever the lapop is on.

grishka 10 hours ago | parent [-]

Then tie it to some signal or power rail that only gets enabled when the camera is in use, and that must be enabled for the camera to work, e.g. when there's power to the sensor itself.

kiwijamo 14 hours ago | parent | prev [-]

Interesting, my work HP Probook does not have that functionality. I wonder why HP chooses to do this only for some laptop lines.

nox101 13 hours ago | parent | next [-]

I suspect most people don't want it. I can imagine lots of people calling customer service "Q: why doesn't my camera work?", "A: Did you open the cover?"

There's just a valid an argument to do the same for phones. How many phones ship with camera covers and how many users want them?

You can get a stick on camera cover for $5 or less if you want one. I have them on my laptops but not on my phone. They came in packs of 6 so I have several left.

https://www.google.com/search?q=camera+cover+laptop

netsharc 13 hours ago | parent | next [-]

> I can imagine lots of people calling customer service "Q: why doesn't my camera work?", "A: Did you open the cover?"

In some over-engineered world, when the camera cover is engaged the webcam video feed would be replaced by an image of the text "Slide camera cover open" (in the user's language) and an animation showing the user how to do so.

nrp 5 hours ago | parent | next [-]

We have that on the most recent generation of Framework Laptop. When the hardware privacy switch is engaged, the image sensor is electrically powered off and the camera controller feeds a dummy frame with an illustration of the switch.

dvergeylen 2 hours ago | parent | next [-]

Happy Framework customer here, I just wanted to say thank you for all your efforts on privacy.

vaylian 4 hours ago | parent | prev [-]

Is there a video or some images of this somewhere? I would love to see a demonstration.

netsharc 2 hours ago | parent [-]

I looked it up on YouTube

https://www.youtube.com/watch?v=k6AsIqAmpeQ&t=1145s

And adding 2+2, the man being interviewed (Nirav Patel) is the same man who replied to my comment (HN user nrp), i.e. the man who actually did the overengineering.

If you rewind to 17:03, he talks about the changes of what the switch does (previously: USB disconnection, now: as he described in grandparent comment).

longdustytrail 10 hours ago | parent | prev [-]

This doesn’t seem that wild to me. Zoom already prompts me to unmute my microphone when I cough.

JumpCrisscross 12 hours ago | parent | prev | next [-]

It's also a moving part. Worse, a part the customer moves. Which means more opportunity for crap getting crammed in or breaking.

II2II 9 hours ago | parent [-]

The cover on my laptop's camera is behind the glass. I suppose there is a chance that the slider itself could get damaged, but at least they minimized the exposed surface that could be damaged.

That said, I really can't comment on how durable it is. I only remove the cover about a half dozen times a year.

moffkalast 13 hours ago | parent | prev | next [-]

I had that exact discussion with somebody recently, and it took me a few minutes to realize that their laptop had a physical camera cover that somehow disables camera permissions in windows too. So yeah, happens a ton I would imagine.

dvngnt_ 13 hours ago | parent | prev [-]

i miss android popup cameras.

MaxikCZ 14 hours ago | parent | prev [-]

Money.

zeroping 14 hours ago | parent [-]

Supporting that theory: my HP EliteBook does have a slide-over cover.

(It could also be contention between thickness of the display vs enterprise customer sensitivity to cameras)

perching_aix 14 hours ago | parent | prev | next [-]

For what it's worth, you could just power on the camera, take a pic, then turn it back off instead. Provided you can do this fast enough, an indicator LED is rendered worthless. So you'd need to make the indicator LED staggered, to stay lit for a minimum amount of time.

There's also the scenario where the LED or the connections to it simply fail. If the circuit doesn't account for that, then boom, now your camera can function without the light being on.

Can't think of any other pitfalls, but I'm sure they exist. Personally, I'll just continue using the privacy shutter, as annoying as that is. Too bad it doesn't do anything about the mic input.

axoltl 12 hours ago | parent | next [-]

I worked on this feature for Apple Macbooks around 2014 as the security architect. All Macbooks since then have a camera indicator LED that is (barring the physical removal of the LED) always on at least 3 seconds. This feature is implemented in gates in the power management controller on the camera sub-board.

There's a LOT of pitfalls still (what if you manage to pull power from the entire camera sub-assembly?), this was a fun one to threat-model.

TZubiri 14 hours ago | parent | prev | next [-]

A minimum light duration seems pretty trivial to physically engineer.

For one the energy to take a picture is probably enough to power a light for a noticeable amount of time.

And if it isn't, a capacitor that absorbs energy and only allows energy through once it's full would allow the light to remain on for a couple of seconds after power subsides.

perching_aix 14 hours ago | parent [-]

Wasn't arguing that it's difficult, just that it's needed (and that I'm not expecting it to be done in practice. Because the indicator LED on my laptop doesn't do it either, despite being enterprise grade).

homebrewer 14 hours ago | parent | next [-]

JIRA is "enterprise grade", I wouldn't place too much faith into that term.

perching_aix 14 hours ago | parent [-]

Trust me, I was using it semi-sarcastically too. This thing is slower than my old Pentium 4 would be, yet has a fast enough 30% to 3% battery discharge rate that it would make the speed of light itself blush.

xxs 8 hours ago | parent [-]

The main culprit is that anyone estimating battery life in percentages. It's about voltage and current draw. The battery voltage can be read directly.

About being slow, I suppose it does run windows and its infamous 'defender'

perching_aix 4 hours ago | parent | next [-]

No, I think it's fairly easy to see that a third of the charge suddenly disappearing is a fairly uncommon behavior.

Same for your Windows idea...

xxs 3 hours ago | parent [-]

"A third" is again fraction/percentage - it's still a representation stuff that depends on charge and charge cycles... and likely previous over charging and heat (Li-Ion doesn't like heat).

To put it simply: the charge level, usually, is just a lookup table for voltage (not under load).

jmb99 7 hours ago | parent | prev [-]

> The main culprit is that anyone estimating battery life in percentages.

I thought this was a solved problem, like, decades ago? At least I remember even the first gen MacBooks having accurate battery percentages, and it’s a more vague memory but my PowerBook G4 did too I think.

xxs 3 hours ago | parent [-]

The "accurate" charging level mostly happens with specific amount of charge cycles (i.e. new). Laptop batteries suffer from higher temperature (over 60C), overcharging (over 4.22 per Li-Ion for most chemistries).

cthalupa 11 hours ago | parent | prev [-]

My 2023 MBP webcam light stays on for nearly 3 seconds after the webcam itself turns off.

dhosek 9 hours ago | parent [-]

Which is part of the design (see comments from the security architect elsewhere in the discussion).

akira2501 12 hours ago | parent | prev [-]

LEDs are diodes. So you can run power _through_ them. Power Supply -> LED -> Camera.

xxs 8 hours ago | parent [-]

While true, the amount of power would be too low, LEDs also have quite high forward voltage (~3V for blue ones) and they are current driven devices. That suggestion would require pass all the current through the LEDs. LEDs don't like to be reverse biased either. Overall, it's a rather appalling idea. On top of the fact that LEDs can fail short.

More also you'd want a hold up time for the light (few seconds at least), as taking pictures would flash them for 1/60 of a second or so.

akira2501 7 hours ago | parent [-]

They have high forward voltage /drop/ which is a useful property. You drive them with constant current for constant brightness and improved lifespan which is most pertinent for LED light bulb replacements than it is for a simple signal status light. Fixed delay before standby isn't hard to enforce either.

Even so this whole attack vector isn't solved with this. How long should the light stay on for after the camera is put in standby before a user considers it a nuisance? 5 seconds? So if I turn my back for longer than that I'm out of luck anyways.

The anti-TSO means would be a hardware serial counter with a display on the camera. Each time the camera is activated the number is incremented effectively forming a camera odometer. Then if my previous value does not match the current value I know it's been activated outside of my control.

xxs 3 hours ago | parent | next [-]

I meant the forward voltage (also not a constant one) in series with the actual load.

perching_aix 3 hours ago | parent | prev [-]

As long as you remember the previous number correctly at least... :)

pesus 14 hours ago | parent | prev | next [-]

I might be out of the loop, but I thought that was only for some machines - I remember the LED being wired that way being a selling point for MacBooks at some point, as a privacy feature. It definitely should be the standard, though!

m463 11 hours ago | parent | prev | next [-]

There was a school district that took pictures of the kids at home.

They briefly saw the LED flash.

But it was not on for any length of time and you could miss it.

This stuff should be completely in hardware, and sensible - stay on for a minimum time, and have a hardware cutoff switch.

criddell 14 hours ago | parent | prev | next [-]

I can't find it now, but recently I read how one company's design team added this feature to their laptops. A subsequent review by the team responsible for manufacturing found that they could change the circuit to cut down on the part count to save money. The light was still there, but it was no longer hardwired. The company continued to advertise the camera light as being hardwired even though it wasn't.

ortusdux 13 hours ago | parent [-]

That fact pattern would setup a solid fraud case against the company and necessitate a recall at a minimum.

kergonath 4 hours ago | parent [-]

Which makes me doubt the anecdote, besides the lack of any specifics or reference.

moritzwarhier 13 hours ago | parent | prev | next [-]

Since some sort of firmware is required, this seems like a "turing tarpit" security exploit from my laymans perspective.

There's no standard that I know, that, like "Secure EFI / Boot" (or whatever exact name it is), locks the API of periphery firmware and that would be able to statically verify that said API doesn't allow for unintended exploits.

That being said: imagination vs reality: the Turing tarpit has to be higher in the chain than the webcam firmware when flashing new firmware via internal USB was the exploit method.

axoltl 12 hours ago | parent [-]

No firmware is required. Macbooks manufactured since 2014 turn on the LED whenever any power is supplied to the camera sensor, and force the LED to remain on for at least 3 seconds.

(Source: I architected the feature)

moritzwarhier 12 hours ago | parent [-]

Thanks for your reply — yourself as the Source can only make me feel flattered then for you responding to me.

> Macbooks manufactured since 2014 turn on the LED whenever any power is supplied to the camera sensor, and force the LED to remain on for at least 3 seconds.

That convinced me originally I think, good old days! I'd almost forgotten about it. The way you phrased it, it sounded like 50% OS concern to me.

But if cam & LED rly share a power supply, and the LED is always on without any external switch, Good then!

axoltl 12 hours ago | parent [-]

I was not very popular with the camera firmware folks for a while. They had to re-architect a bunch of things as they used to occasionally power on the camera logic without powering the sensor array to get information out of the built-in OTP. Because the LED now came on whenever the camera was powered they had to defer all that logic.

ProfessorLayton 12 hours ago | parent [-]

What does OTP stand for in this case? The camera PROM??

axoltl 11 hours ago | parent [-]

Apologies. OTP is One-Time-Programmable. The physical implementation of this varies, in this specific case it was efuses (anti-fuse, actually). It's used for things like calibration data. For a camera it contains information about the sensor (dead pixels, color correction curves, etc.).

qingcharles 9 hours ago | parent | prev | next [-]

I stumbled on a forum once where it was just filled with people trying to modify the software for various laptops to disable the "tally lamp" (as it is called). There were people selling the mods and one guy claiming he was selling his cracks to three-letter agencies. The people on there seemed to be using this to extort people (mostly women) by being able to record videos without the owner knowing. Some really dark shit.

Nursie 9 hours ago | parent [-]

Yeah the first day I read about RATers... jesus. The camera LED seemed to be a major thing for them, because if they could bypass it then the chance their RAT would be discovered was much lower.

Really nasty world they've made for themselves, blackmailing, extorting and generally controlling other people (mostly women and girls, but some men too) with threats of releasing compromising material.

wutwutwat 13 hours ago | parent | prev | next [-]

In the past I've used microsnitch on macos which tells you when the mic or camera are activated, but macos seems to have support for this baked into the os now. In zoom calls the menu bar shows what is active. If this can be sidestepped and avoided in software, and the camera can be activated without any indicator, I do not know. If direct access can be done, and you don't need to go through some apple api to hit the camera, maybe.

edit: looks easily bypassed https://github.com/cormiertyshawn895/RecordingIndicatorUtili...

endigma 12 hours ago | parent | next [-]

Using this tool requires disabling SIP, so not "easily bypassed" at least from a malware perspective.

0xDEAFBEAD 13 hours ago | parent | prev [-]

Did it ever snitch on anything interesting?

wutwutwat 12 hours ago | parent [-]

idk, but maybe you know! it was probably easily bypassed anyway. hardware disconnects are the only thing that can ever be trusted imo

ortusdux 14 hours ago | parent | prev | next [-]

I'd like a law to this effect.

bluGill 13 hours ago | parent | next [-]

We may already have this law. If the manufactures makes claims about this LED, then that this attack is possible mean a lawyer can force them to recall and fix everything.

pooper 14 hours ago | parent | prev [-]

We have to be realistic though. We can't even get a law requiring right to replace a battery on our own iPhones...

Aaargh20318 13 hours ago | parent | next [-]

We can’t? Then what is this? : https://environment.ec.europa.eu/news/new-law-more-sustainab... ?

CharlesW 13 hours ago | parent | prev [-]

Go to https://www.ifixit.com/Device/iPhone, then search for your iPhone's battery replacement guide.

TZubiri 14 hours ago | parent | prev | next [-]

The idea has been around for quite some time. But it is always dropped.

My guess is that, assuming the most basic and absolute physicial design, the light would flash for silly things like booting, upgrading firmware, checking health or stuff like that.

greenthrow 14 hours ago | parent [-]

Flashing is easily fixed with a capacitor and also not a bad thing if it turns off when it loses power immediately. The only explanation that makes sense to me is it being separately controlled is a feature not a bug.

TZubiri 12 hours ago | parent [-]

I agree on the capacitor fix for flashing, I pointed it out in another post.

In this case I was referring to false positives to the user.

This would mean we can't update the firmware without causing the user some paranoia.

Also. Would an app requesting permission to use camera itself send some power to the camera to verify it is available? In a similar vein, what about checking if the camera is available before even showing the user the button to use the camera?

Maybe there's solutions to this, I'm just pointing out some reasons they may have gone the software route instead of the hardware route.

WiSaGaN 9 hours ago | parent | prev | next [-]

That's why many ThinkPads have physical covers over their cameras. You don't even need to worry about whether the LEDs are hardwired - relying on any electronic indicator is already a half-baked security measure. If you want real security, just go with a physical solution.

DaiPlusPlus 5 hours ago | parent [-]

…until it isn’t: my ThinkPad P1 Gen 6 has the camera cover, yes - but it doesn’t have a cover for the depth-sensing camera, only the RGB cam, even though userland applications can get imaging data from that camera just as easily - which is potentially a bigger security issue: I imagine you could reconstruct my facial shape from the data and build a dummy head to get into my iPhone/iPad via FaceID.

(No, I’m not actually worried about this, I’m far too unimportant for anyone to make a targeted attack against)

agumonkey 14 hours ago | parent | prev | next [-]

same... i'm also surprised that having a software controlled led would be cheaper ..

lxgr 14 hours ago | parent [-]

It could be something very simple, such as requiring less USB hub complexity for a camera that can be woken up via a command on the USB bus instead of needing to connect/disconnect the USB power rails (wired in parallel with the LED) to it.

Somebody here has also mentioned Apple using the camera for brightness and maybe color temperature measurement, for which they wouldn't want to enable the LED (or it would effectively always be on).

That doesn't automatically make that a good tradeoff, of course; I'd appreciate such a construction.

kergonath 4 hours ago | parent [-]

> Somebody here has also mentioned Apple using the camera for brightness and maybe color temperature measurement, for which they wouldn't want to enable the LED (or it would effectively always be on).

That is not true. MacBooks have separate light sensors. And the camera physically cannot activate without the LED lighting up and a notification from the OS. People say a lot of stupid things in the comments…

orbital-decay 13 hours ago | parent | prev | next [-]

It's probably done to keep it in a low powered state and reduce the initialization delay. Maybe also to prevent the Windows USB plugging sound from playing upon turning the camera on, as it would seem weird to the user ("I don't have any USB devices plugged in...")

Likely UX over security and privacy.

geor9e 14 hours ago | parent | prev | next [-]

Sure, for a brand headquartered in Cupertino they might design it that way. But this one is a Beijing brand.

esprehn 9 hours ago | parent | prev | next [-]

Yeah, on Chromebooks and MacBooks the LED is hardwired to ensure it's always on when the camera is enabled.

itslennysfault 14 hours ago | parent | prev | next [-]

Yeah, my understanding is that is how the light on MacBooks works, but I'm not sure about any other makes/models. Obviously, if this is possible that Thinkpad model doesn't do that.

ajsnigrutin 14 hours ago | parent | prev | next [-]

Most business class thinkpads have a physical cover in the screen that covers the camera with a piece of plastic.

Led, no led, who cares, plastic is blocking the lens. Move the cover away, say hi on zoom, wave, turn the camera back off, cover on, and stay with audio only, as with most meetings :)

adolph 14 hours ago | parent | prev | next [-]

It isn't clear to me that webcam firmware ever powers down a typical camera module. See below for data about how the Sony IMX708 sensor is an I2C device with start and stop streaming commands.

https://github.com/Hermann-SW/imx708_regs_annotated?tab=read...

TheRealPomax 14 hours ago | parent | prev | next [-]

It wasn't. Only responsible manufacturers wired them up that way.

jiggawatts 14 hours ago | parent | prev | next [-]

"Add an LED next to the camera, our customers demand it!"

"Job done boss!"

That's it. That's what happens. Nobody ever reviews anything in the general industry. It's extremely rare for anyone to raise a stink internally about anything like this, and if they do, they get shouted down as "That's more expensive" even if it is in every way cheaper, or "We'll have to repeat this work! Are you saying Bob's work was a waste of time and money!?" [1]

[1] Verbatim, shouted responses I've received for making similar comments about fundamentally Wrong things being done with a capital W.

bluGill 13 hours ago | parent [-]

Lawyers after the fact review this. I expect one to start a class action - they will make millions, and everyone else who has this laptop will get $1. The real point is the millions means every other company is on notice that these mistakes hurt the bottom line and so the industry starts to review these things. So long as it doesn't hurt they won't review.

I feel really dirty calling lawyers the good guy here, but ...

daedrdev 13 hours ago | parent [-]

What law as been broken by not implementing this feature?

bluGill 9 hours ago | parent [-]

If they promise a feature they don't have that is falwe advertising.

jiggawatts 2 hours ago | parent [-]

The feature is an LED light next to the camera. They delivered it.

TacticalCoder 11 hours ago | parent | prev | next [-]

> I thought the whole point of these camera LEDs was to have them wired to/through the power to the camera, so they are always on when the camera is getting power, no matter what.

This definitely happened too on Mac in the past, then they went in damage control mode. Not only had Apple access to turn off the LED while the camera was filming, but there was also a "tiny" company no-one had ever heard off that happened to have the keys allowing to trigger the LED off too. Well "tiny company" / NSA cough cough maybe.

After that they started saying, as someone commented, that it requires a firmware update to turn the LED off.

My laptop has a sticker on its camera since forever and if I'm not mistaken there's a famous picture of the Zuck where he does the same.

I've got bridges to sell to those who believe that the LED has to be on for the camera to be recording.

samatman 10 hours ago | parent [-]

I believe every paragraph of this besides the personal anecdote is completely made up. Care to change my mind?

Shekelphile 13 hours ago | parent | prev [-]

Only apple does this properly.

epistasis 14 hours ago | parent | prev | next [-]

I can see why some people might be concerned about the camera, but I'm far more concerned by the microphone. There's far more sensitive and actionable information that can be gathered from me that way! I'm glad that macOS started putting a light in the menubar when the microphone is in use, but I'd prefer to have unhackable hardware for that instead.

3eb7988a1663 13 hours ago | parent | next [-]

I believe it is possible to turn a speaker into a microphone. Found a paper which claims to do just that[0]. So, there is no safety anywhere?

  SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit
  It is possible to manipulate the headphones (or earphones) connected to a computer, silently turning them into a pair of eavesdropping microphones - with software alone. The same is also true for some types of loudspeakers. This paper focuses on this threat in a cyber-security context. We present SPEAKE(a)R, a software that can covertly turn the headphones connected to a PC into a microphone. We present technical background and explain why most of PCs and laptops are susceptible to this type of attack. We examine an attack scenario in which malware can use a computer as an eavesdropping device, even when a microphone is not present, muted, taped, or turned off. We measure the signal quality and the effective distance, and survey the defensive countermeasures. 
[0] https://arxiv.org/abs/1611.07350
orbital-decay 13 hours ago | parent | next [-]

This only works on audio chipsets that allow pin retasking. Which is, coincidentally, all Realtek chipsets that are present in every PC...

(you also need to plug the speaker directly, mostly limiting it to headphones and laptop speakers)

bluGill 13 hours ago | parent [-]

Even where it works, speakers are much worse microphones that dedicated microphones, and so the amount of data that can be gathered is low. Why bother when you probably have a microphone on the same PC that can capture far more sound?

KeplerBoy 2 hours ago | parent | next [-]

This isn't about audio fidelity, this just about getting audible spoken words, which is definitely possible even with the worst microphone.

bobthebutcher 12 hours ago | parent | prev [-]

I think there was a long period where a proper PC would frequently have only the cheap stereo speakers which are small enough to far outperform raw microphone leads. But I'm not sure this works that well in >=HDMI even if some monitor speakers might otherwise be ideal.

lynndotpy 12 hours ago | parent | prev | next [-]

Despite this being a 2016 paper, it's worth noting that this is true in general and has been common(ish) knowledge among electrical engineers for decades. Highschoolers and undergrads in electrical engineering classes often discover this independently.

What's notable about this paper is only that they demonstrate it as a practical attack, rather than just a neat fun fact of audio engineering.

As a fun fact, an LED can also be used as a photometer. (You can verify this with just a multimeter, an LED, and a light source.) But I doubt there's any practical attack using a monitor as a photosensor.

Anechoic 8 hours ago | parent | next [-]

and has been common(ish) knowledge among electrical engineers for decades.

Not only is it common knowledge it's how drive-thru kiosks work!

Source: I used to test microphone/speakers for a kiosk OEM.

nurple 8 hours ago | parent | prev [-]

Yes! LEDs as photometers is something that you don't really see around much anymore, but it is really cool. Even an LED matrix can be used as a self-illuminating proximity sensor with the right setup.

https://www.youtube.com/watch?v=GaAtpAuNN_o

NTARelix 13 hours ago | parent | prev [-]

I recall in the early or mid 2000s using some cheap earbuds plugged into the microphone port of my family computer as a pair of microphones in lieu of having a real microphone nor the money for one. Then I used Audacity to turn the terrible recording into a passable sound effect for the video games I was making.

Not knowing much about how soundcards work, I imagine it would be feasible to flash some soundcards with custom firmware to use the speaker port for input without the user knowing.

megraf 12 hours ago | parent [-]

This is common at nightclubs (or was) - a DJ can use their headphones as a microphone, speaking into one channel and listening to another

Example https://m.youtube.com/watch?v=1NNP6AFkpjs

:-)

ohhnoodont 9 hours ago | parent | prev | next [-]

Yup it's wild to me how much anxiety there is about cameras while no mind is given to microphones. Conversations are much more privileged than potentially seeing me in my underwear.

That said the most sensitive information is what we already willingly transmit: search queries, interactions, etc. We feed these systems with so much data that they arguably learn things about us that we're not even consciously aware of.

Covering your camera with tape seems like a totally backwards assessment of privacy risk.

LadyCailin 10 minutes ago | parent [-]

I’m just going to assume you’re a man, and don’t generally worry about things like revenge porn. Because that is a bigger concern to me than you, it seems. Sure, I don’t want my sound to be recorded either, but that’s why I put a cover on the webcam AND turn off the physical switch on my (external) microphone. They are both easy things to do.

curun1r 13 hours ago | parent | prev | next [-]

The microphone also can't be covered with a $1 plastic camera cover off Amazon. It's so easy to solve the camera issue if you care about it, but there's really nothing you can do about the mic.

542458 14 hours ago | parent | prev | next [-]

FWIW, modern Macbooks also hardware disable the mic when the lid is closed.

https://support.apple.com/en-ca/guide/security/secbbd20b00b/...

ryanisnan 13 hours ago | parent | next [-]

How is that true? I use my macbook mic occasionally with the lid closed, and an external monitor.

bennyg 13 hours ago | parent | next [-]

Plus one-ing this - I think the external monitor may be the kicker to keeping the mic active. This drives me up the wall when Google Meet decides to just default to the closed Macbook next to me instead of my already connected Air Pods when joining work meetings.

Gigachad 2 hours ago | parent [-]

The closed macbook next to you has infinitely better sound quality than the airpods mic which will sound like you are underwater.

dagmx 13 hours ago | parent | prev [-]

Are you sure it’s the MacBook (T2 or Arm) mic? I imagine you’d sound super muffled if you were trying to use it while closed anyway, so I can’t imagine it’s very usable to yourself?

bluSCALE4 10 hours ago | parent | prev [-]

I just tested this with Voice Memo and can confirm it works at least in that scenario. The recording didn't stop, the mic was just disconnected then reconnected when lid was opened. Using Amphetamine w/ script installed on M1.

pjot 10 hours ago | parent [-]

Just to point it out, but there’s a native terminal command `caffeinate` that does the same as Amphetamine.

I use the -disu flags

wutwutwat 13 hours ago | parent | prev | next [-]

Miclocks are a thing, or any chopped 3.5mm 3 prong plug should do the trick

https://mic-lock.com/products/copy-of-mic-lock-3-5mm-metalli...

This still doesn't stop a program from switching the input from external back to the internal mics though afaik

rocqua 4 hours ago | parent | prev | next [-]

How will microphone access be monetized?

For video, it is extortion. For microphone, it's much harder.

sunsetonsaturn 3 hours ago | parent [-]

Record, produce transcript, look for keywords, alert the puppeteer when something interesting is picked up - trade secrets, pre-shared keys, defense sector intelligence, etc.

goodpoint 2 hours ago | parent [-]

And even record keystroke sound to extract passwords.

andix 12 hours ago | parent | prev | next [-]

I'm not sure if an attacker could get some additional sensitive information from me with access to the microphone or the camera, if they already have full access to my PC (files, screen captures, keylogger). Most things they would be interested in is already there.

chgs 14 hours ago | parent | prev | next [-]

Hardware switch in line with the microphone. Can’t be turned on behind my back.

ASalazarMX 13 hours ago | parent [-]

Wireless noise-cancelling headphones. Oh no, the microphone is back through bluetooth.

kibwen 13 hours ago | parent [-]

If you're half-serious about this sort of opsec, you already have bluetooth disabled. Ideally your hardware wouldn't have support for it at all. Same for wifi.

salutis 14 hours ago | parent | prev | next [-]

macOS is a proprietary binary blob, remotely controlled by Apple. So, the light in the menu bar is not a reliable indicator of anything. There is no privacy on macOS, nor any other proprietary system. You can never be 100% sure what the system is doing right now, as can be anything it is capable of. Apple is putting a lot of money to "teach people" otherwise, but that is marketing, not truth.

lxgr 14 hours ago | parent | next [-]

> There is no privacy on macOS, nor any other proprietary system.

Nor is there on any free system for which you didn't make every hardware component yourself, as well as audit the executable of the compiler with which you compiled every executable. (You did self-compile everything, hopefully?)

lmm 8 hours ago | parent | next [-]

> Nor is there on any free system for which you didn't make every hardware component yourself, as well as audit the executable of the compiler with which you compiled every executable.

If the components follow standards and have multiple independent implementations, you can be reasonable confident it's not backdoored in ways that would require cooperation across the stack. At least you raise the cost bar a lot. Whereas for a vertically integrated system, made by a company headquartered in a jurisdiction with a national security law that permits them to force companies to secretly compromise themselves, the cost of compromise is so low that it would be crazy to think it hasn't been done.

kergonath 4 hours ago | parent | prev | next [-]

> You did self-compile everything, hopefully?

Including the compiler, of course.

ndjdjddjsjj 2 hours ago | parent | prev [-]

HN. 2 extremes. No nuance.

joemag 14 hours ago | parent | prev | next [-]

The root of all trust is eventually some human, or group of humans. See "Reflections on Trusting Trust." At least so far, Apple has convinced me that they are both willing and competent enough to maintain that trust.

salutis 13 hours ago | parent [-]

Myself, I stopped trusting Apple. There are now too many dark patterns in their software, especially once one stops using their services. And, DRM was re-instantiated, when iTunes started streaming as Apple Music. On top of that, their lies, such as those about the Butterfly keyboards being fixed, cost me a fortune. They fuck up the keyboard design, and then they buy the computer back for 40% of its original price, due to a microscopic scratch nobody else could see. And that happened twice to me. They put a lot of money into advertising themselves as being ethical, but that is only marketing. These, of course, are my personal opinions.

vanchor3 10 hours ago | parent [-]

> DRM was re-instantiated, when iTunes started streaming as Apple Music

Purchased music is DRM free. Streaming music was never DRM free, since you arguably do not "own" music that you have not purchased. Though I'm sure record labels would love if they could get DRM back on purchased music again.

TZubiri 14 hours ago | parent | prev | next [-]

I get it, free software take, nothing new.

But this is a pretty extremist take. Just because a company doesn't push source code and you can't deterministically have 100% certainty, doesn't mean you can't make any assertions about the software.

To refuse to make any claims about software without source is as principled as it is lazy.

Imagine an engineer brought to a worksite, and they don't have blueprints, can he do no work at all? Ok, good for you, but there's engineers that can.

salutis 13 hours ago | parent | next [-]

Yes, I think all devices packed with sensors that live in our homes should be transparent in what they do, that is their code should be available for everyone to see. And yes, it is extremist take, given where we ended up today.

kasey_junk 14 hours ago | parent | prev [-]

It’s even dumber than that because the people that do assurance work don’t rely solely on source even when it’s available.

Reversing the software is table stakes for assurance work already so suggesting source is a requirement just doesn’t match reality.

perching_aix 14 hours ago | parent | prev | next [-]

> There is no privacy on macOS, nor any other proprietary system.

Which is to say, every system in actual widespread use. All such CPUs, GPUs, storage devices, displays, etc. run closed microcode and firmware. It'd be funny if it wasn't so profoundly sad.

And even if they didn't, the silicon design is again, closed. And even if it wasn't closed, it's some fab out somewhere that manufactures it into a product for you. What are you gonna do, buy an electron microscope, etch/blast it layer by layer, and inspect it all the way through? You'll have nothing by the end. The synchrotron option isn't exactly compelling either.

salutis 13 hours ago | parent [-]

Yes, ultimately, I want everything to be open. This is not a bag of rice. These are devices packed with sensors, in our homes. As for inspection, I do not have a problem trusting others. I just do not trust big corporations with remotely controlled binary blobs, no matter how much money they put into the safety and security ads. This is a personal opinion, of course.

perching_aix 13 hours ago | parent | next [-]

> As for inspection, I do not have a problem trusting others. I just do not trust big corporations with remotely controlled binary blobs

I'll just highlight this excerpt of your own words for you, and usher you to evaluate whether your position is even internally consistent.

salutis 3 hours ago | parent | next [-]

Why do you think my stance is internally inconsistent?

For example, I completely trust Emacs maintainers, as I have yet to see any malice or dark patterns coming from them. The same applies to other free and open source software I use on a daily basis. These projects respect my privacy, have nothing to hide, and I have no problem trusting them.

On the other hand, I see more and more dark patterns coming from Apple, say when signed out of their cloud services. They pour millions into their privacy ads, but I do not trust them to act ethically, especially when money is on the table.

Does this not make sense?

perching_aix 3 hours ago | parent [-]

Thinking about it, I might have misunderstood what you wrote a bit. What I read was that you trust people, but then you also don't. That's not really a fair reading of what you wrote.

That being said, I have seen "patterns" with open source software as well, so I'm hesitant to agree on trusting it. But that's a different problem.

I also know how little hardware, microcode and firmware can be trusted, so that doesn't help either.

j16sdiz 4 hours ago | parent | prev [-]

(not OP) Don't think that is inconsistent.

Trusting someone doing the right thing when you purchase is different from trusting them not tampering things remotely in the future. Companies can change management, human can change their mind. The time factor is important

perching_aix 3 hours ago | parent [-]

Hardware can be and is implemented such that it changes behavior over time too, or have undisclosed remote capabilities. There are also fun features where various fuses blow internally if you do specific things the vendor doesn't fancy.

There sure is a difference in threat model, but I don't think the person I was replying to appreciates that, which is kind of what triggered my reply.

kergonath 4 hours ago | parent | prev [-]

> I just do not trust big corporations with remotely controlled binary blobs

Only outstanding individuals such as Jia Tan.

epistasis 11 hours ago | parent | prev | next [-]

Once malware is installed, the proprietary blobs from my hardware vendor are the least of my concerns. Thus my request for hardware.

james_marks 14 hours ago | parent | prev [-]

You can watch network traffic for data leaving the device. Trust but verify.

3eb7988a1663 13 hours ago | parent | next [-]

For something as compressible as voice, I do not know how you would feel confident that data was not slipping through. Edge transcription models (eg Whisper) are continuing to get better, so it would be possible for malware to send a single bit if a user says a trigger word.

lxgr 14 hours ago | parent | prev [-]

Good luck auditing even just a single day of moderately active web browsing.

kube-system 12 hours ago | parent [-]

It's easier than reading all of the code in Ubuntu.

lxgr 12 hours ago | parent [-]

But still entirely impossible. So does it matter?

perching_aix 11 hours ago | parent [-]

Network traffic monitoring is routinely done at enterprises. It's usually part-automated using the typical approaches (rules and AI), and part-manual (via a dedicated SOC team).

There are actual compromises caught this way too, it's not (entirely) just for show. A high-profile example would be Kaspersky catching a sophisticated data exfiltration campaign at their own headquarters: https://www.youtube.com/watch?v=1f6YyH62jFE

So it is definitely possible, just maybe not how you imagine it being done.

lxgr 7 hours ago | parent [-]

I do believe that it sometimes works, but it's effectively like missile defense: Immensely more expensive for the defender than for the attacker.

If the attacker has little to lose (e.g. because they're anonymous, doing this massively against many unsuspecting users etc.), the chance of them eventually succeeding is almost certain.

perching_aix 3 hours ago | parent [-]

All cyberdefenses I'm aware of are asymmetric in nature like that, unfortunately.

catlikesshrimp 14 hours ago | parent | prev [-]

Soldering iron to the rescue. Locate the microphone and unsolder it.

I haven't seen any microphone integrated in the processor.

Yet

ferbivore 13 hours ago | parent | next [-]

M2 and newer MacBooks have an IMU on-board, which is just a funny way of spelling microphone. Admittedly a very low quality one; I'm not sure if you could pick up understandable speech at the 1.6kHz sample rate Bosch's IMUs seem to support.

nullhole 5 hours ago | parent | next [-]

> M2 and newer MacBooks have an IMU on-board, which is just a funny way of spelling microphone. Admittedly a very low quality one; I'm not sure if you could pick up understandable speech at the 1.6kHz sample rate Bosch's IMUs seem to support.

Are there examples of using IMUs to get audio data you could point to? A quick search didn't reveal anything.

ferbivore 2 hours ago | parent [-]

There's this paper, which made the news at the time I think: https://crypto.stanford.edu/gyrophone/files/gyromic.pdf

And there's this post, which includes an audio clip: https://goughlui.com/2019/02/02/weekend-project-mma8451q-acc...

internetter 9 hours ago | parent | prev [-]

> M2 and newer MacBooks have an IMU on-board

Why?

fph 13 hours ago | parent | prev | next [-]

Going into full paranoid mode, I wonder if some other sensors / components can be used as a makeshift microphone. For instance, a sufficiently accurate accelerometer can pick up vibrations, right? Maybe even the laser in a CD drive? Anything else?

meindnoch 13 hours ago | parent | next [-]

Camera + bag of chips: https://people.csail.mit.edu/mrub/VisualMic/

goodpoint 2 hours ago | parent [-]

Impossible with normal cameras.

bluGill 13 hours ago | parent | prev [-]

A condenser microphone is just a capacitor. Your computer is full of them.

They are very low level input and generally need a pre-amp just to get the signal outside the microphone. However conceptually at least they are there and so maybe someone can get it to work.

ansgri 14 hours ago | parent | prev [-]

Well it doesn’t need to be visible to work in contrast to camera. Seriously though, no technological and almost no economic barrier preventing embedding a mic into every wireless communication chip.

yjftsjthsd-h 13 hours ago | parent [-]

Sure, but that requires the manufacturer to be intending to spy, in contrast to someone compromising after the fact.

mrb 14 hours ago | parent | prev | next [-]

On a ThinkPad X1 Carbon Gen 8, it's easily possible record video with the webcam LED off. I did not verify newer generations of the X1 Carbon.

Lenovo put a little physical switch—they call it "ThinkShutter"—that serves to physically obstruct the webcam lens to prevent recording. It's supposed to have only two positions: lens obstructed or not. But if the user accidentally slides it halfway, you can still record video with the lens unobstructed but somehow the webcam LED turns off. It's because the ThinkShutter actually moves 2 pieces of plastic: 1 to cover the lens, 1 to cover the LED. But the piece covering the LED blocks it first, before the other piece of plastic blocks the lens. I discovered this accidentally yesterday while toying with a X1 Carbon... I am reporting it to Lenovo.

wmlhwl 13 hours ago | parent | next [-]

In Yoga C740 it only blocks the shutter. Covering the LED doesn't make sense to me

mrb 3 hours ago | parent [-]

I suppose covering the LED is a less expensive way to provide the same user experience as hooking an electrical switch to the ThinkShutter to electrically turn off the LED when it's in the "blocked" position.

IshKebab 2 hours ago | parent | prev [-]

How does malware move the plastic?

rickdeckard an hour ago | parent | prev | next [-]

Production of the ThinkPad X230 stopped 10 years ago in 2014. Would be more interesting to read something about a RECENT model.

In late 2014 was the last big webcam vulnerability "hype" I remember [1], which led to a wave of media attention, webcam covers, vendor statements that LED-control is / will be hard-wired etc.

I'm more interested how this big attention impacted future designs of laptops (like my cheap HP here, which has a built-in camera cover)

[1]: https://www.usenix.org/conference/usenixsecurity14/technical...

zakqwy 40 minutes ago | parent | prev | next [-]

Just install an NSA-B-GONE, my janky open-source modboard that adds Thinklight-controlled USB hardware switches to the webcam and microphone! Designed for the X220, but the X230 is pretty similar so I bet it would work: https://github.com/zakqwy/NSA-B-GONE

Of course, if everyone does that, attackers will just start pulsing Thinklights and seeing if anything enumerates, I suppose.

lxgr 14 hours ago | parent | prev | next [-]

Arguably a much, much bigger problem are the (many) microphones of modern devices.

These usually get neither an LED nor a switch, and unlike cameras can't easily be covered, nor pointed away from potentially sensitive topics/subjects.

coppsilgold 9 hours ago | parent | next [-]

And having a microphone in the same chassis as the keyboard would make creating a keylogger easier. A microphone in the same room as the keyboard can be made into a keylogger[1].

[1] <https://github.com/shoyo/acoustic-keylogger>

8f2ab37a-ed6c 14 hours ago | parent | prev | next [-]

At the same time we're at a point where synthesizing your voice is getting more trivial everyday, you need only a few seconds of it and you can be made to say whatever someone wants.

lxgr 13 hours ago | parent [-]

Sure, but that doesn’t mean they learn everything I said: Passwords, personal details etc.

Also, getting a voice sample in the first place gets significantly easier that way: Not everybody publishes video or audio recordings of themselves online.

schroeding 13 hours ago | parent [-]

> Passwords

Which reminds me, to strengthen your point, it doesn't have 100% keystroke recognition, but there are works[1] on keylogging via audio, and 93% via Zoom-quality audio streams is concerning enough for me.

[1] https://arxiv.org/abs/2308.01074

throwaway74354 13 hours ago | parent | prev | next [-]

>These usually get neither an LED nor a switch

Lots of ThinkPads have «Microphone is muted» LED. Not exactly what's requested (and is bound to a software mute/unmute shortcut), but it's better than nothing regarding state of machine being observable with a quick glance.

mkj 12 hours ago | parent [-]

That one seems to be software controlled. I'm fairly sure I remember having the mic working with the mute LED lit, which was confusing. That was on a x1 carbon gen9.

throwaway74354 11 hours ago | parent [-]

Correct, its usefulness depends on software working as expected (and not being tampered with)

    echo 1 | sudo tee /sys/devices/platform/thinkpad_acpi/leds/platform\:\:micmute/brightness 
is enough to turn the LED on without muting the mic.
paxys 14 hours ago | parent | prev [-]

No amount of microphones will ever be a bigger problem than a single compromising photo or video.

lxgr 14 hours ago | parent | next [-]

Then you're lacking fantasy.

For example, I'd not be happy having my voice auto-transcribed by some malware as I authenticate to my bank providing my SSN etc (which as an authentication method is of course horribly insecure, but that's a different discussion).

Of course, this will vary from person to person, but as mentioned above, just being able to mechanically cover a camera when required makes it less of an issue for me.

Loughla 13 hours ago | parent [-]

I'm with you. I can recover from nudes of me being on the Internet. That night even help me filter out friends that aren't really friends.

If someone drains my accounts, I'm definitely screwed.

gambiting 2 hours ago | parent [-]

>>If someone drains my accounts, I'm definitely screwed.

You ring your bank and it's reversed almost instantly. Your photos on the internet you have no way of doing anything about them, they are there forever.

chgs 14 hours ago | parent | prev | next [-]

I can’t think of much if anything which would be a compromising photo or video from my laptop, but conversations certainly are.

goodpoint 2 hours ago | parent | prev | next [-]

In most business environments it's the opposite.

MattGaiser 14 hours ago | parent | prev | next [-]

A photo may be merely embarrassing. You could get a lot of immediately useful information hearing my phone calls though.

bdangubic 14 hours ago | parent | prev [-]

I am dying for a compromising photo/video leak - I’ll finally be able to convince my wife to start OF channel :)

MrDresden 4 hours ago | parent | prev | next [-]

After GCHQ was discovered doing this back in 2014 with their 'Optic Nerve' program[0], I have tried to avoid computers with integrated webcams for use as my personal devices (exceptions are mobile devices).

An exception to that rule is if they have hardware switches for turning off the power supply to the camera and microphone.

Currently, I am very happy with my Framework, where the LED is hardwired into the power supplied to the camera[1].

[0]: https://en.wikipedia.org/wiki/Optic_Nerve_(GCHQ)

[1]: https://community.frame.work/t/how-do-the-camera-and-microph...

larusso 14 hours ago | parent | prev | next [-]

I assumed that most if not all of these webcam LEDs are wired in series with the power to the camera itself. Which then makes it impossible to disable them. Who designs this LED to be software addressable?

greycol 14 hours ago | parent | next [-]

Assuming Hanlon's razor it's a Chesterton's fence situation you just see a LED that indicates the camera is on. Assuming they ask the question at all they think it's just to remind you your still streaming/in a meeting. Then someone asks any of the following questions:

Can we use it to indicate additional information?

Can we make it standard with the other LEDs?

Can we dim it so it's more pleasant to use at night or make it a customisable colour?

I'm sure plenty of other questions take you down the same path and you've just destroyed one of the LEDs most useful functions.

hugh-avherald 10 hours ago | parent [-]

What do you mean by Hanlon's razor and Chesterton's fence?

greycol 9 hours ago | parent [-]

Both are common sayings and easily googleable:

Hanlon's Razor: Don't attribute to malice what can be attributed to stupidity

Chesterton's Fence (worth googling as it's a nice little parable, or it might be a derivation of the parable,can't quite remember): Can boil it down to: if you don't know what something does assume it serves a purpose until you've figured out what purpose it used to serve. In this case I'm implying these people are playing the part of wanting to change the fence without knowing it's purpose.

ehsankia 14 hours ago | parent | prev | next [-]

To be fair, from what I can tell ThinkPad X230 is from 2012, which is over a decade ago, and my guess is that this practice was not yet common place.

vanchor3 9 hours ago | parent | prev | next [-]

In series with the power to the camera would be odd. You would be passing the same amount of current through both the camera and the LED. Unless you meant in parallel, which still leaves the other issue that the camera is likely always powered even when not in use, so the LED would always be on.

ryukoposting 14 hours ago | parent | prev | next [-]

I'm not an EE by trade, but I personally wouldn't want to put a CCD in series with an LED with god-knows-what Vf tolerances. Then again, I'd bet that nearly all laptop webcams come as off-the-shelf modules with their own internal regulators for the CCD anyway. So maybe it wouldn't matter.

I'll bet it went something like this: As originally specified, the user need was "LED privacy indicator for the webcam." Product management turns that into two requirements:

1) LED next to webcam.

2) LED turns on and off when webcam turns on and off.

Requirement 1 gets handed to the EEs, and requirement 2 gets handed to the firmware engineers. By the time a firmware engineer gets assigned the job of making the LED turn on and off, the hardware designers are already 1 or 2 board spins in. If the firmware engineer suggested that we revise the board to better fit the intention of the user needs, one of two things will happen:

1) They'll get laughed out of the room for suggesting the EEs and manufacturing teams go through another cycle to change something so trivial.

2) They'll get berated by management because it's "not the engineers' place to make decisions about product requirements."

Of course this is all spitballing. I've definitely never been given a requirement that obviously should have been a hardware requirement. I've definitely never brought up concerns about the need to implement certain privacy and security-critical features in hardware, then been criticized for that suggestion. And I've definitely never, ever written code that existed for the sole purpose of papering over bad product-level decision making.

Nope, never. Couldn't be me.

samuelg123 12 hours ago | parent [-]

Could you wire it with a relay/transistor?

ryukoposting 10 hours ago | parent [-]

I'd just add a resistor and stick it + the LED in parallel with the camera module. If it's a white LED and a 1.8V supply, you might not even need the resistor (you should probably still put a 0 ohm link in there though, just in case).

INTPenis 13 hours ago | parent | prev | next [-]

>Who designs this LED to be software addressable?

The very first home made monitoring camera I made with a Raspberry Pi 1 and the camera module you could disable the LED in the config.

So it seems to be an old pattern. Definitely would make the most sense to focus on privacy and make the LED hard wired but here we are.

criddell 14 hours ago | parent | prev [-]

Does that mean if the LED dies the camera is dead?

a2800276 14 hours ago | parent [-]

You could wire it up either way. In general the LED is extremely likely to outlive the rest of the laptop, though.

ghjfrdghibt 3 hours ago | parent | prev | next [-]

This is why I like a self built PC over laptops. Now I'm sure there's still some way to spot on me via a PC with no built in camera or microphone but I bet it's more difficult.

I do have a laptop and it have a physical cover I can slide into place. Short of black blutack I've not got a decent option for the mic though.

Aardwolf 30 minutes ago | parent [-]

> Short of black blutack I've not got a decent option for the mic though.

And then there's the issue that speakers can theoretically be used as a microphone as well

xvilka an hour ago | parent | prev | next [-]

ThinkPad X1 solved this problem by having a physical camera shutter, embedded one. Nothing beats that (though there is a problem of potentially transparent material of the shutter, so this need to be checked as well).

albert_e 3 hours ago | parent | prev | next [-]

All devices -- smartphones included -- need a hardware control to disconnect microphone and camera, and a clear indicator when they are ON.

Privacy and security risks of the future loom big.

nolok 14 hours ago | parent | prev | next [-]

For what it's worth, my Lenovo laptop has a manuel shutter slider button on the side that actually physically covers the camera (and it must also does something driver wise because windows considers it unplugged). It's so easy and convenient that I always use to off the camera.

Many of lenovo have that even included their gaming laptop line (it's actually even better and more convient on that one, thanks to the larger size available).

Doesn't solve the problem this article talks about, but if that's something that worries you I would still trust that more than most (and it's a lot less weirdo looking than taping your camera).

quickslowdown 14 hours ago | parent | next [-]

This exploit picks up audio, too. The shutter helps make sure you're not accidentally sending nudes to North Korea's hacking teams, but audio can still be hijacked unfortunately.

2OEH8eoCRo0 14 hours ago | parent [-]

I'm a known exhibitionist. It would damage my reputation if there weren't nudes floating around.

PrismCrystal 14 hours ago | parent | prev | next [-]

Taping your camera doesn't necessarily look like anything. I have a small piece of electrical tape over my webcam, and it blends in so perfectly with the background that other people probably wouldn't see it unless they were specifically looking for it.

(I personally just leave the tape there all the time, because if I need to videoconference, I’d rather connect my mirrorless camera with a much better lens and sexy bokeh.)

catlikesshrimp 14 hours ago | parent [-]

Permanent black marker ink over camera lens. Easier fix

WalterBright 14 hours ago | parent | prev [-]

A post-it note works if you don't have a slider.

climb_stealth 14 hours ago | parent | next [-]

The Electronic Frontier Foundation sells a set of stickers exactly for this purpose [0]. I have a set and it works reasonably well. And it supports a good cause.

[0] https://shop.eff.org/products/laptop-camera-cover-set-ii

catlikesshrimp 14 hours ago | parent | prev [-]

People won't look at you the same way after you do this. And it won't be for the better

perching_aix 14 hours ago | parent | next [-]

It's an extremely common practice in enterprise IT, literally nobody gives a shit.

coffeeoverlord 14 hours ago | parent | prev [-]

More effective than trying to get permanent marker ink to block light getting through the lens.

unit149 an hour ago | parent | prev | next [-]

>getting software control of the webcam LED on ThinkPad X230 without physical access to the laptop.

adding an LED implant control by flashing a USB, internally on an "8051-based" CPU, where the value's dependence is a feature of a dynamic memory allocator.

going one step further with cron tasks scheduled at irregular intervals would be interesting.

used to be able to do the inverse with an old TV set using a RFID controller back in the early 90's.

cjaackie 3 hours ago | parent | prev | next [-]

It’s fun to find the intel 8051 in literally everything, this model webcam being no exception. So is it the most ubiquitous cpu ever or what?

EVa5I7bHFq9mnYK 2 hours ago | parent [-]

Looks like it, I remember coding for it in 1991)

WalterBright 14 hours ago | parent | prev | next [-]

Of course it can.

Cameras and microphones and write enable must have physical switches, not software ones. When will people learn?

Never.

Me, I unplug the camera and mike when not in use.

schroeding 14 hours ago | parent | next [-]

Agreed. I find so much peace of mind in the microphone / webcam hardware switches of my Framework laptop.

Seeing the webcam actually vanish from the list of devices is very nice. :D

deepsun 9 hours ago | parent [-]

In their new upcoming webcam module for Framework they would still cut off the sensor power, but not the USB interface due to usability issues (e.g. in my experience Google Meet can detect the camera after the privacy switch turned on, but Zoom and Microsoft Teams do not)

https://youtu.be/k6AsIqAmpeQ?t=1021

lxgr 14 hours ago | parent | prev | next [-]

> Cameras and microphones and write enable must have physical switches, not software ones. When will people learn?

Your preferences are not everybody's. Personally, I'd be totally fine with a camera and microphone LED that is guaranteed to activate whenever there is power/signal flowing from either.

> Me, I unplug the camera and mike when not in use.

That's a bit hard to do on a laptop that has both built in.

lolinder 11 hours ago | parent | next [-]

> That's a bit hard to do on a laptop that has both built in.

The Framework laptops have two tiny switches near the camera that physically turn off the mic and camera, and it presumably wouldn't be difficult for other manufacturers to follow suit if enough people cared.

WalterBright 7 hours ago | parent | prev [-]

> guaranteed

I used to design airplane parts and systems. A guarantee isn't worth squat. Being able to positively verify it is what works.

You're right that I don't use a laptop for videoconferencing. I wouldn't use the builtin mike and camera anyway, as a 5 cent microphone can make it hard for the other party to understand you. I use a semi pro mike. If you're in business, I recommend such a setup.

LorenDB 14 hours ago | parent | prev | next [-]

Some laptops (I've seen it on a lot of Thinkpads) include a physical cover that can be slid over the webcam when you aren't using it. While that doesn't cut power to the camera or mic, I figure would pretty straightforward for manufacturers to add contacts to the camera cover to use it as a power killswitch instead of just a privacy cover.

kiwijamo 14 hours ago | parent [-]

I think that's pretty standard outside the Apple ecosystem. HP seem to have this on most (if not all) the laptops I've seen at $DAY_JOB which uses HP for all laptops.

CoastalCoder 14 hours ago | parent | prev | next [-]

> When will people learn?

Different persons learn this at different times (or never).

But then market dynamics come into play, as well as the current state of the legal code / enforcement.

pessimizer 13 hours ago | parent | prev [-]

> Cameras and microphones and write enable must have physical switches, not software ones. When will people learn?

I feel like people were pleading for this when people were getting ratted and began taping over their cameras, and the tiny number of laptop manufacturers just ignored what would be a cheap easy change. Eventually, people just accepted that it must be impossible to install a switch. I couldn't ever think of any motivation for a lack of a switch other than government pressure, so I've always assumed that the cameras and microphones are backdoored.

I don't get how "some tape" became the standard solution for these thousand dollar devices.

WalterBright 7 hours ago | parent [-]

I remember the repair book "How To Keep Your Volkswagen Alive for the Complete Idiot". On some beetles the battery light would flicker dimly, though nothing seemed to be wrong. The recommended fix was to put enough tape over it to block the flicker, but not the full on.

Black electrical tape was also the solution for the blinking 12:00 on consumer VCRs.

joe4481 43 minutes ago | parent | prev | next [-]

imho almost any wireless device can be compromised and now everything is wireless it is worth to add a layer of security by faraday bags. good explanation here: https://lebloksecurity.com/the-ultimate-guide-to-faraday-bag...

Eavolution 14 hours ago | parent | prev | next [-]

I am not a hardware engineer or anything of the sort. My laptop has a slide shutter over the webcam, but this obviously does nothing about the microphone. How difficult/error prone would it be for the power signals to the microphone and camera to be individual wires/traces and have a physical switch that breaks the power or data connection physically? Surely these are very low voltage so the switch could be like the iphone mute switch?

Pwngu 13 hours ago | parent | next [-]

My Framework 13 has this - 2 physical switches next to the camera. I would assume (but haven't checked), that they physically disconnect the camera/mic.

deepsun 9 hours ago | parent [-]

Yes it disconnects power: https://youtu.be/k6AsIqAmpeQ?t=1021

schroeding 13 hours ago | parent | prev [-]

The Framework laptop does this for both microphone and webcam, and there are privacy focused Android phones which also have a microphone switch which cuts the power to the microphone. It's definitely possible.

stainablesteel 8 hours ago | parent | prev | next [-]

this is so widespread and simple that i basically don't have any respect for laptop manufacturers who refuse to add a simple webcam shutter onto their laptop designs

what would be even better is PHYSICAL HARDWARE POWER SWITCHES for microphones, speakers, and webcam

this ought to be a manufacturer regulation, no more ridiculousness

southernplaces7 5 hours ago | parent | prev | next [-]

Camera, meet square of electrical tape. Problem solved. Remove tape as needed for video conferences and etc. Why harbour doubts when you can apply solutions?

eggy 9 hours ago | parent | prev | next [-]

Turning off camera LEDs and recording video is an old hack and old news. This is for a specific firmware and computer model and attack surface via USB to update the webcam's firmware, so I am assuming that makes it news?

EDIT: I keep a piece of black electric tape over any of my notebook's webcams.

nicce 8 hours ago | parent [-]

Many assume that led indicators are tied to hardware rather than firmware. And this just proves that it is still not always the case.

l33tman 13 hours ago | parent | prev | next [-]

How does the Macbook check the ambient light to determine the screen brightness, does it have a separate ambient light detector buried under the screen somewhere or inside the camera? (if the camera is not used for this I mean which would have been the best thing to do, but would require the camera to grab frames now and then without the LED flashing)

kibwen 13 hours ago | parent | next [-]

In this vein, apps on your phone likely have unrestrained access to the photosensor, and researchers have figured out how to take low-resolution photos with it: https://news.mit.edu/2024/study-smart-devices-ambient-light-...

wusel 13 hours ago | parent | prev | next [-]

There is a third little dot near the camera you can see with a flashlight and that's an ambient light sensor.

axoltl 12 hours ago | parent | prev [-]

Macbooks have a dedicated ALS (Ambient Light Sensor). They don't use the camera.

SirMaster 12 hours ago | parent | prev | next [-]

My laptop just has a little plastic cover you slide over the lens when not in use. Why isn’t this simply more common?

racl101 12 hours ago | parent [-]

Surprised Apple hasn't implemented it and charged an additional $50 for the feature.

yndoendo 10 hours ago | parent | prev | next [-]

The top part of a sticky note, found in most offices, works great with having to take off and put back on. Always assume that the company's provided laptop is a RAT with voice and video recording with notice is a norm.

internetter 9 hours ago | parent [-]

> Always assume that the company's provided laptop is a RAT with voice and video recording with notice is a norm.

I... don't? Depends on the company, but I trust that my company has no override for the hardware based LED light on my Mac, as well as the software based microphone indicator. If they did, I would consider this highly scandalous for apple

TrianguloY 13 hours ago | parent | prev | next [-]

Technology connections made a very sarcastic but entertaining video of the "stupid" design of being able to control the camera and the led independently.

https://m.youtube.com/watch?v=m0mMF7GaIR0

wkat4242 11 hours ago | parent | prev | next [-]

I'm surprised how much these X230s are still being used. People who love real keyboards love them.

Personally I didn't think Lenovo's later keyboards were too bad. The one on my T490s was wonderful. However since my work moved to the T14s series, the keyboards have become terrible. The key movement range is too low now, and the feel is crap. It's too bad because Lenovo was the last holdout which still had decent keyboards. The T14s is also bad in other ways, the body got thinner but the screen got a lot thicker and heavier so it's actually worse to carry than the T490s.

Anyway, ontopic: I'm not surprised these cam controller firmwares can be hacked. It's very specific to the controller though.

However, most people I know that care about privacy close the cam door anyway, or put a sticker over it. I use the SpyFy. https://spy-fy.com/collections/webcam-covers . Good luck hacking that.

What worries me a lot more is the microphone. It doesn't have a light, and it's really hard to block. A simple sticker won't do much. These things are super sensitive. I can literally hear myself talking in the other room with the right boost settings.

camtarn 11 hours ago | parent | next [-]

100% agree with you on the keyboards. I had an X220, then a T490, and now I'm on an E16. The keyboard has gotten noticeably worse every time I've upgraded, sacrificing key travel and feel for flatness. It's such a shame - I would happily take a little extra body thickness for a nicer feeling keyboard.

fiatpandas 8 hours ago | parent | prev [-]

Still use my X230.

I swapped its keyboard with an x220 one, which is the thing to do if you are into the older thinkpad KB feel.

thread_id 5 hours ago | parent | prev | next [-]

Why The FBI Director Puts Tape Over His Webcam

"I saw something in the news, so I copied it. I put a piece of tape — I have obviously a laptop, personal laptop — I put a piece of tape over the camera. Because I saw somebody smarter than I am had a piece of tape over their camera."

https://www.npr.org/sections/thetwo-way/2016/04/08/473548674...

Is there anyone who doesn't do this?

Grimblewald 5 hours ago | parent [-]

Nope, in fact i have no built in mic or camera, and theyre unplugged when not strictly needed.

jacobgorm 12 hours ago | parent | prev | next [-]

This is well known in the security community, when I was at Bromium around 2011 or 2012 this was shown in internal demos. And the X230 is a very old laptop, hopefully the newer ones have fixed this problem.

sylware an hour ago | parent | prev | next [-]

Saw that a decade ago, and let's not talk about the mic you cannot mechanically disable.

Deliverable computer security is something which does _NOT_ exist. If somebody is telling you otherwise, they are trying to sell you something.

Less worse scenario: you need to strip down software (including the SDK) and hardware to the bear minimum, and to aim for excrutiating simplicity still able to do a good enough job (this is currently mostly denied by the "planned obsolescence" and "overkill complexity" from Big Tech or brain damaged "standards/SDK"). Maybe, then, and I say maybe, you may have a little chance, but usually that chip(CPU) you are using is full of backdoors (or convenient bugs) anyway.

1oooqooq 14 hours ago | parent | prev | next [-]

after it can read my keyboard, .ssh files, browser cookie files... i couldn't care much for the camera. and everything you run can already do all that. occlude stuff you npm/cargo/mvn/go/pip/mix install. not to mention those git hooks or build scripts of that project you just downloaded the source in vscode and it's already running all that for your convenience right away.

xyst 10 hours ago | parent | prev | next [-]

Could be useful, if this was 2000s. These days don’t even need to hack the victim. They proudly give it all up via social media. Talk to a person long enough and they will spill every detail about their life. Routine, job, social life, deepest desires.

wutwutwat 13 hours ago | parent | prev | next [-]

There's a reason that zuck has tape over his webcam and a 3.5mm dummy plugged into his combo headphone/mic jack

fiatpandas 8 hours ago | parent | next [-]

How would a 3.5mm dummy mic jack prevent software from just changing the input mic source to the built in one?

wutwutwat 5 hours ago | parent [-]

it probably doesn't

https://news.ycombinator.com/item?id=42260216

Loughla 13 hours ago | parent | prev [-]

Yeah but he's also WAAAAYYYYY more likely to be targeted than any of us, I would argue.

wutwutwat 13 hours ago | parent [-]

The odds of being targeted don't matter in what we're talking about. The fact its possible is what we're talking about. High value targets like zuck being well aware of that fact, and taking steps to guard against it is just icing on the cake.

ourmandave 14 hours ago | parent | prev | next [-]

Ah, but can it remove the painters tape I have across the lens at all times because I read about f*ckery like this?

mithametacs 10 hours ago | parent | prev | next [-]

If someone has this level of control of my system, pictures of me are my least concern. You can have them. Fuck off away from my bank account tho.

throwaway81523 12 hours ago | parent | prev | next [-]

Another demonstration that duct tape can fix almost everything. Put a little over the webcam and presto, no more malware spying on you through webcam video. Now about something for the microphone?

perching_aix 11 hours ago | parent | next [-]

And arguably if one applies duct tape all over the laptop, the laptop can no longer be used, therefore no data can be input into it, preventing that data to be then exfiltrated by malware. A truly versatile product.

SamuelAdams 12 hours ago | parent | prev [-]

It’s easy enough to disassemble your thinkpad and unplug the mike. Use external mikes if you need them, they will be better quality anyways

efitz 8 hours ago | parent | prev | next [-]

Software interlocks considered harmful.

See: Therac-25

baudpunk 10 hours ago | parent | prev | next [-]

I got a webcam with a built in cover, so that's not an issue for me. Microphones are creepy, however.

voidfunc 5 hours ago | parent | prev | next [-]

The lesson is always cover your camera.

nicman23 3 hours ago | parent | prev | next [-]

this has been a thing since windows xp..

megiddo 8 hours ago | parent | prev | next [-]

How else would you do lights out eye tracking for heatmap evaluation??

racl101 12 hours ago | parent | prev | next [-]

Slideable plastic covering tabs on Amazon people. Only a $2 purchase for a pack of 6.

permo-w 14 hours ago | parent | prev | next [-]

my ideapad has a native physical webcam cover. no idea why this isn't universal standard

ragnese 14 hours ago | parent [-]

Eh. If it's not a physical power-disconnect switch, one could imagine it still being able to record audio, which still sucks.

lxgr 14 hours ago | parent | next [-]

The microphone is usually not part of the camera assembly in modern laptops.

And there is usually more than one. For example, recent Macbooks have three, as far as I know.

ragnese 13 hours ago | parent [-]

Oh, bummer. I definitely had assumed that they were a single "device".

delecti 14 hours ago | parent | prev [-]

That's how it works on my work-provided HP laptop. The physical switch is only an opaque block on the camera.

proee 8 hours ago | parent | prev | next [-]

I wonder why Macs stopped using record LEDS. Seems if they are hardwired into the enable signal of the camera you would have some piece of mind.

lockedinspace 13 hours ago | parent | prev | next [-]

Duck tape FTW, sometimes, simple things achieve the best results.

lefixx 14 hours ago | parent | prev | next [-]

I am so disappointed that there are camera LEDs out there that they aren't hardware connected to the sensor. Especially when there are bio-metric sensors out there that can do a crap-ton of calculation all in-device so no privacy concerns arise. I wonder if any of them are vulnerable to a firmware attack.

to11mtm 11 hours ago | parent | prev | next [-]

Is this even news news?

As other mentioned Apple has had either good circuit design or now 'attestation' (which has other concerns, but that's more of a state actor worry).

That said it reminds me of the fun reversal of how a decade or so ago, Windows Phone 'lost' the ability to get the hot app SnapChat, because they did not want to give apps the ability to 'detect' a screenshot command in the name of privacy. Now, We have Copilot on windows, and LinkedIn tells me when I've screenshotted a post as a notification.

thrillgore 5 hours ago | parent | prev | next [-]

The easiest solution is to assume your webcam is 100% hostile and keep a cover/sticker on it until you need it.

userbinator 5 hours ago | parent | prev | next [-]

This approach likely affects many other laptops, as connecting the webcam over USB and allowing to reflash its firmware is a common design pattern across laptop manufacturers.

WTF? Am I the only one who thinks webcams shouldn't even need accessible firmware in the first place? I have one which is over 2 decades old and it has worked perfectly fine (albeit at a low rsolution) since the day it was bought, with no need for any firmware updates.

booleandilemma 9 hours ago | parent | prev | next [-]

I'd like a laptop without a built in microphone and camera altogether, to be honest.

josephcsible 6 hours ago | parent [-]

On a Framework laptop, you can physically remove the module with the webcam and microphone.

m3kw9 11 hours ago | parent | prev | next [-]

They need to wire the led directly to the wire that powers the camera sensor in parallel, can’t hack physics.

bastloing 12 hours ago | parent | prev | next [-]

This surprises you how? It's just software controlling hardware. Heck, they can flash that led to music if they wanted.

aussieguy1234 14 hours ago | parent | prev | next [-]

This has been possible for decades, lots of mischief was done by teenagers using different RAT tools like BackOrfice, SubSeven etc back in the day...

okasaki 14 hours ago | parent | prev | next [-]

Don't even understand why laptops have cameras and microphones. If you're serious about video meetings you'll want an external camera anyway.

I keep covering them up with bits of paper (because like most people, I don't trust LEDs or switches) that look ugly and invariably get blown off by a gust of wind and have to be reapplied when moving.

It just seems like at some point around 2010 some cabal decided that every device with a screen needs to have a camera facing the user and a microphone.

prmoustache 13 hours ago | parent | next [-]

> Don't even understand why laptops have cameras and microphones. If you're serious about video meetings you'll want an external camera anyway.

The whole point of a laptop is to be able to move around and travel with it.

FWIW you can still encounter laptops without webcams (MNT reform comes to my mind) and you can also choose to disable/load/unload the kernel modules for them dynamically on linux distros and BSDs

Aaron2222 13 hours ago | parent [-]

HP also allows ordering some of their business laptops without webcams.

nharada 14 hours ago | parent | prev | next [-]

I'm not serious about video meetings, but that doesn't mean I never have to take them.

duskwuff 13 hours ago | parent | prev [-]

There's lots of people who aren't "serious about video meetings" but still want to be able to do a face-to-face chat with family or whatnot.

okasaki 13 hours ago | parent [-]

So get a $15 USB webcam.

ziddoap 12 hours ago | parent | next [-]

I bought a laptop specifically so I had less objects and wires to carry around.

okasaki 12 hours ago | parent [-]

But you do carry your phone with you right? You can use that as a webcam/mic.

cesarb 12 hours ago | parent | prev [-]

That would be yet another gadget (with yet another tangly wire) to add to your bag. One of the best things (and one of the worst things, if you're interested in repairability and upgradability) of a laptop is that everything (other than the external power adapter) is built-in.

IAmNotACellist 13 hours ago | parent | prev | next [-]

When those cameras first came out I said that of course the LEDs could be disabled with firmware only, and it was probably a government-mandated requirement to be able to do so, and I was called a conspiracy theorist.

Well who's laughing from within a tinfoil Faraday cage now?

mindslight 14 hours ago | parent | prev [-]

Fantastic, another nothingburger proof of concept for people to point to when arguing in favor of more manufacturer-lockdown-based "security". It's not a coincidence that this demonstration is on one of the last generations of laptops that can actually be secured against Intel themselves.

In reality, remote code execution should be considered game over, end of story. Trying to obfuscate to hide that fact just ends up creating more unknown places for malware to persistently hide. The same knowledge that allows one to write new camera firmware also allows one to verify it on every boot. Meanwhile the camera model that hasn't been publicly documented is an ever-present black box.

perching_aix 14 hours ago | parent [-]

> for people to point to when arguing in favor of more manufacturer-lockdown-based "security"

I don't see why this is the first thing you think of, when the infinitely more obvious thing to point out is that the indicator LED should be impossible to address and be connected in series with the power pin of the camera instead. Case in point, most other comments in this very discussion thread.

Conversely, your comment (to me) reads like you're trying to derail conversation and argue in favor of weakening device security in whatever flavor you find compelling. Very intellectually honest of you to present those ideas this way.

mindslight 14 hours ago | parent [-]

Sure, you can solve this one particular thing with fixed hardware [0]. The problem is that just slightly more complex, any designer isn't going to opt for hardcoded logic but rather going to go "we have a microcontroller sitting right here, of course we're going to use it". This path ends with firmware "security" that prevents straightforwardly reading/writing these devices, which is exactly what my comment is about.

> you're trying to derail conversation and argue in favor of weakening device security

No, I'm arguing in favor of analyzing security in terms of device owners rather than manufacturers. "Security" isn't simply some singular property, but is rather in the context of a specific party [1]. It's certainly possible to build hardware that verifies running software and also doesn't privilege the manufacturer with an all-access pass. Just no manufacturers have done it, because centralizing control in their favor is easier.

[0] even this case is borderline. Your series LED suggestion isn't likely to be work because it will drop at least 1.6v, and constrain the current draw of the camera. Also if the firmware can be reprogrammed such that it can take pictures using very low average current draw, you haven't actually solved the problem. Alternatively, an LED in parallel with the power supply will require at least an additional resistor (if not a diode and a capacitor), which costs real money in the eyes of a design engineer working at consumer volumes.

[1] eg how the TSA that drones on about "security", while they're actually making individual travelers less secure from having to unpack and splay their belongings out, making them easy targets for immediate or later theft. They're not talking about your security, they're talking about their operation's security.