Remix.run Logo
542458 8 months ago

They are hardwired on Macbooks. From Daring Fireball, quoting an email from an Apple engineer.

> All cameras after [2008] were different: The hardware team tied the LED to a hardware signal from the sensor: If the (I believe) vertical sync was active, the LED would light up. There is NO firmware control to disable/enable the LED. The actual firmware is indeed flashable, but the part is not a generic part and there are mechanisms in place to verify the image being flashed. […]

> So, no, I don’t believe that malware could be installed to enable the camera without lighting the LED. My concern would be a situation where a frame is captured so the LED is lit only for a very brief period of time.

https://daringfireball.net/2019/02/on_covering_webcams

nine_k 8 months ago | parent | next [-]

That's backwards.

The LED should be connected to camera's power, or maybe camera's "enable" signal. It should not be operable via any firmware in any way.

The led also has to be connected through a one-shot trigger (a transistor + a capacitor) so that it would light up, say, for at least 500 ms no matter how short the input pulse is. This would prevent making single shots hard to notice.

Doing that, of course, would incur a few cents more in BOM, and quite a bit more in being paranoid, well, I mean, customer-centric.

jdblair 8 months ago | parent | next [-]

or, you can have a physical switch, like the Framework. that also hits your BOM but its not complex!

alwyn 8 months ago | parent | next [-]

My previous HP Envy x360 had such a switch on the side of the laptop that would electronically disconnect the webcam; it would completely disconnect according to the system. Enabling it would show a new device being connected in `dmesg`.

Not a great laptop otherwise, but that was pretty good!

Vogtinator 8 months ago | parent [-]

My envy x360 has that button as well and it even puts a physical shutter in front of the webcam in addition to disconnecting USB.

oneshtein 8 months ago | parent | prev | next [-]

You can buy/print and stick a physical «webcam cover»[1] manually on your notebook or phone.

My current notebook, manufactured in 2023, has very thin bar on top of screen with camera, so I need a thin, U-like attachment for the switch, which is hard to find.

[1]: https://www.printables.com/model/2479-webcam-cover-slider

ddalex 8 months ago | parent | next [-]

Am I the only one that is not worried at all about the camera and super concerned about microphones ? The camera may see me staring into the screen, woo hoo. The microphones will hear everything I discuss, incl. confidential information.

There is no physical microphone cover there, is it ?

lukan 8 months ago | parent | next [-]

Sound is usually more sensitive, yes. But even if there is a physical switch on the laptop, only very exotic smartphones have them.

Also, loudspeakers can act as microphones, too.

In other words, paranoia gets exhausting in modern times.

(And my smartphone has a replacable battery for that reason to at least sometimes enjoy potentially surveillance free time)

MarcusE1W 8 months ago | parent | next [-]

My Pinephone has a switch for the microphone and also my Pinebook Pro laptop. But I also would agree that this is exotic hardware.

whatevaa 8 months ago | parent | next [-]

Well i have Pinebook Pro and it's pretty much abandonware, pine doesn't do any software and OSS lacks maintainers, nobody want's it, e-waste laptop. Take it as you will.

KetoManx64 8 months ago | parent | next [-]

Don't they warn you on the product page that you are buying hardware that is fully reliant on the community for functionality? That's the reason it's so inexpensive

megous 8 months ago | parent | prev [-]

Yeah, that's nonsense. Pinebook Pro is well supported by Linux kernel and you can thus put any aarch64 Linux distro on it. And it's been this way for the last 3-4 years at the very least.

I've been using it daily for 3 years for watching movies and main notebook while traveling.

It's not at all abandonware or e-waste.

lukan 8 months ago | parent | prev [-]

"But I also would agree that this is exotic hardware."

No shit. How is the current state btw?

I suppose still not ready to be a daily driver to replace my normal phone?

ri0t 8 months ago | parent | next [-]

> I suppose still not ready to be a daily driver to replace my normal phone?

I'd say that depends on your definition of daily driver and/or how much compromises you're willing to take. I occasionally see members at my larger hackerspace running around with those or other seemingly "unfit" hardware and not complain too much about it ;)

megous 8 months ago | parent | prev [-]

Kernel is in "maintenance and focussed on upstreaming" mode for a few years already, after getting nearly full HW support about 2-3 years ago.

As for phone feature, reliability of that depends on reliability of firmware of the modem, which was always shaky.

sharpshadow 8 months ago | parent | prev [-]

I have an old iPhone 7 which has an audio IC issue and the microphone is physically disconnected. Calls don’t work, video records without sound etc. need to connect an external microphone to have one.

Apart from the inconvenience it was somehow liberating knowing there is no microphone physically active.

jdblair 8 months ago | parent | prev | next [-]

The Framework has a physical microphone switch next to the camera switch.

klausa 8 months ago | parent | prev | next [-]

Modern (2019-ish? forwards?) MacBooks have physical disconnect for microphones when the lid is shut.

jack_arleth 8 months ago | parent [-]

Framework laptops have the same solution.

dghughes 8 months ago | parent | prev | next [-]

And the true or not Google or other apps listening then you see ads based on that conversation. I think it's true since far too many times obscure things I've spoken about appear in ads soon after the conversation. So yes I'd say a mic blocking feature you can confirm is working, blocking, is needed.

karolist 8 months ago | parent | next [-]

Recommendation engines work on vast amounts of data they have on you and whatever made you speak about thing X was likely preceded by your internet activity which is not very unique as a precursor to speaking about X. In other words, if other people do Y on the internet and then end up doing stuff related to X, the recommendation engine will show you X just because you also did Y.

The other explanation is one of your contacts who were part of the conversation did things that either directly related to thing X, which you spoke about, or something the algorithm see other people do that relates to X, and you got shown ads based on your affiliation to this person.

I've also worked at FAANG and never seen proof to such claims anywhere in the code, and with the amount of people working there who care about these issues deeply I'd expect this to leak by now, if this happens but is siloed...

ch4s3 8 months ago | parent | prev | next [-]

> I think it's true since far too many times obscure things I've spoken about appear in ads soon after the conversation

People have been making claims like this since at least the early 90s, about TV then, and no one ever credibly claims to have worked on something like this. I've worked with purchased ad data and I've never seen this data or anything that implies that it exists. It seems far more likely that its a trick of memory. You ignore most ads you see, but you remember ones that relate to odd topics that interest you.

wsintra2022 8 months ago | parent | next [-]

I agree with this sentiment, people talk about x product then realise they are seeing ads for x product. Most likely the ads were there first and the people only start talking about it cause the ads have been working.

ch4s3 8 months ago | parent [-]

That’s pretty much it. You see an obscure ad without realizing it and have a related conversation later. Then when you see the ad again and make note of it, it feels strange.

megous 8 months ago | parent | prev [-]

Yeah, we're well past a point where "phones" have NPUs powerful enough to locally process "sensor" input and produce decontextualized probabilties of potential interests.

It's going to happen sooner or later and people will accept it, just like they accepted training of AI models on copyrighted works without permission, or SaaS, or AWS/PaaS, or sending all their photos to Apple/Google (for "backup").

ch4s3 8 months ago | parent [-]

I really question the commercial value of that kind of data. Credit card data has a lot more to do with intent to make future purchases than any keyword you might spit out verbally or in a search engine.

gravitronic 8 months ago | parent | prev | next [-]

Reminds me of the chrome bug I filed years ago that is still unfixed. An extension with access to all browsing tabs can open a hidden iframe to a website that commonly would have mic and camera permission (like hangouts.google.com), and then inject its own JavaScript into that hidden iframe to capture mic or camera.

For this to work hangouts.google.com had to not include the HTTP header to block iframing but thankfully if you make up a URL the 404 page served on that domain does not include that http header.

Qem 8 months ago | parent | prev [-]

Just a personal anecdote: I don't have a dog, but my grandma has two. Once, while visiting her, the dogs were barking a lot. Almost immediately I started receiving ads for dog food in my cellphone.

sandywaffles 8 months ago | parent [-]

It is more likely your GPS placed you in the vicinity (regularly?) with another AD ID that regularly searches for, purchases, or visits dog centric locations. It's also entirely possible that the other AD ID's (your grandma) dog food schedule is predictable and you happen to be visiting within a time frame of dog food purchases.

Qem 8 months ago | parent [-]

My grandma never owned a cellphone, only an old landline. And she buys dogfood in the neighborhood mom & pop store.

xvector 8 months ago | parent [-]

Well, we know for a fact it wasn't your mic being recorded. Maybe you walked by WiFi networks where people purchase dog food.

chipsrafferty 7 months ago | parent [-]

Or maybe the mic IS being recorded. We don't know it for a fact until all phone software is open sourced.

michaelt 8 months ago | parent | prev | next [-]

The camera privacy issue arises because teenagers and college kids often have their computer in their bedroom.

So a webcam hack that lets them watch my 16 year old daughter study would also let them watch her sleeping, getting dressed, and making out with her boyfriend.

pmontra 8 months ago | parent [-]

It's not only a teenager or college kid issue. I've seen adults with a computer in their bedroom because it's a kind of private space where they don't expect anybody to inadvertently bump into it.

My laptop is in my bedroom in winter, right now, because it's one of the smallest rooms and I can heat it easily. I use it in other parts of the house in the other seasons. I do have a sliding cover on the camera. I bought it years ago. The main issue is the microphone.

shermantanktop 8 months ago | parent | prev | next [-]

When I have to do faux-2FA auth using numeric codes sent by text or email, I sometimes catch myself quietly saying the numbers. A microphone would by quite handy for an attacker, even if they couldn’t see all my network traffic.

camgunz 8 months ago | parent | prev | next [-]

A picture of you with the subject "I know what you were looking at when I took this picture of you" is pretty good blackmail--I think there's an active campaign doing this even.

ddalex 8 months ago | parent | next [-]

This would've been blackmail 20 years ago.... nowadays it's just "of course you know, I shared my OF likes publicly", will not even raise an eyebrow; or perhaps I'm living in too bohemian society circles

throw16180339 8 months ago | parent | prev | next [-]

I received a phishing email from this campaign or a similar one several months ago. The email opened with my name and contained a Google Maps photo of a house where I'd lived 8 years before. The author claimed to have hacked my laptop and captured videos of me doing embarrassing things. They would release the videos unless I paid them $1000 in Bitcoin. I searched and it's an extremely common scam, but I did panic for a few minutes.

jeltz 8 months ago | parent | prev [-]

Excellent blackmail against teenagers. Pointless against me as an adult.

spacemanspiff01 8 months ago | parent | prev | next [-]

I honestly like the physical switch on the framework, which disconnects the microphone/webcam fully.

djtango 8 months ago | parent | prev | next [-]

Yes I really wish we could have a physical switch for device mic

ykonstant 8 months ago | parent | prev | next [-]

As someone who often speaks gibberish to myself due to ptsd, if someone recorded me in my room they could convince anyone I am utterly insane, beyond any hope. It is a great way to blackmail people with coprolalia or other verbal tics.

And yeah, if they had access to my webcam, they would just see a guy staring into the screen or walking back and forth in the room.

chmod775 8 months ago | parent [-]

Eh, random utterances are more common than you think. Especially amongst older people. Most will know at least a couple family members who tend to mutter random things to themselves.

Nobody who is themselves sane is going to judge another for random crap they say when they think themselves alone.

ashoeafoot 8 months ago | parent | prev | next [-]

Your speakers are a microphone ..

benj111 8 months ago | parent | next [-]

I seem to recall reading somewhere that 'everything' is a thermometer, on the basis that many things behave differently at different temperatures.

You can also use an LED as a light sensor.

and I also came across a YT vid of a console that used a piezo electric speaker for motion sensing.

I wonder if you could use a track pad to pick up sound.

Sporktacular 8 months ago | parent | prev [-]

Yeah, but they aren't an input device with an amp wired in the right direction and an A/D converter to read it out.

dfox 8 months ago | parent [-]

If there is a discrete PA in the speaker path, then not. But I would not be that surprised if there is a single chip codec + PA combination that can conect an internal ADC to pins that are primarily meant as PA outputs of the integrated PA.

_joel 8 months ago | parent | prev | next [-]

Disable it all in the BIOS?

pmoriarty 8 months ago | parent | prev [-]

"Am I the only one that is not worried at all about the camera and super concerned about microphones ? The camera may see me staring into the screen, woo hoo. The microphones will hear everything I discuss, incl. confidential information."

All phones are suspect. We should go back to only carrying pagers.

volkl48 8 months ago | parent | prev | next [-]

Just to note: Apple will refuse to cover any screen damage under warranty if one of these sorts of things was in use.

I would not be surprised if the same is true for some other manufacturers, too, but I can only speak definitely to Mac.

The issue is that lids close too closely + tightly now, and so anything more than a piece of tape winds up focusing all the pressure applied to the closed lid on that one spot in the glass, since the cover winds up holding the display slightly off the base of the laptop when in the closed position.

micahdeath 8 months ago | parent [-]

i use a piece of tin foil - tiny peanut butter cup wrappy - stays in place lovely

moregrist 8 months ago | parent | prev | next [-]

I find that the sticky part of a post-it works very well for this. Sometimes you have to clean the adhesive part off with 70% IPA, but not too often.

Not as pretty as a custom cover but cost-effective and can generally be done in under a minute with common office supplies (post-it + scissors) which has its own advantages.

7 months ago | parent | prev | next [-]
[deleted]
codedokode 8 months ago | parent | prev [-]

My laptop has built-in physical camera cover, and it doesn't cost even as much as a half MacBook.

SiVal 8 months ago | parent | prev | next [-]

Would a bit of Post-It Note (for minimal adhesion) damage the screen coating if left on most of the time? Would even that much thickness stress the screen when opened and closed thousands of times? Is there a better (self-service) material?

moregrist 8 months ago | parent | next [-]

I’ve used one for years on various MacBooks and it’s very effective. The paper is very thin so it causes no real mechanical stress and also opaque, so all the camera sees is a field the color of that paper.

There’s been no damage to the screen from the adhesive although occasionally I’ve had to clean the residual adhesive with 70% IPA, but nothing worse than the typical grime that most laptop monitors pick up.

pcblues 8 months ago | parent | prev | next [-]

Plastic slide covers that stick on are pretty cheap if your laptop doesn't already have one. I also think that the open microphone issue is a greater problem, especially with the current ability of speech-to-text, but what you utter may not be as important as being seen "doing a Toobin" during an online meeting. YMMV :) (I won't expand that acronym!)

cuu508 8 months ago | parent | prev [-]

> Would a bit of Post-It Note (for minimal adhesion) damage the screen coating if left on most of the time?

Possible, I have one IPS monitor with a spot on screen where the color is pale. I had a post-it note there and I guess something bad happened when I tore it off.

grvbck 8 months ago | parent [-]

I used electrical pvc tape for many years on my macbooks, no damage but I got tired of them leaving glue residue. Switched to post-its about 10 years ago, works perfectly.

I've never tried them on a matte or coated screen though.

ARandomerDude 8 months ago | parent [-]

I use painter’s tape for a similar effect.

goodpoint 8 months ago | parent | prev | next [-]

This is the right solution. And a hardware switch cost is completely negligible in a $1000 laptop.

xandrius 8 months ago | parent [-]

But the margins?

GTP 8 months ago | parent [-]

Customers wouldn't care to pay a dollar more on a thousand plus device. This would likely increase the margin instead of shrinking it.

8 months ago | parent | prev [-]
[deleted]
throw646577 8 months ago | parent | prev | next [-]

> The LED should be connected to camera's power, or maybe camera's "enable" signal.

Wiring it in like this is suboptimal because this way you might never see the LED light up if a still photo is surreptitiously captured. This has been a problem before: illicit captures that happen so quickly the LED never has time to warm up.

Controlling the LED programmatically from isolated hardware like this is better, because then you can light up the LED for long enough to make it clear to the user something actually happened. Which is what Apple does -- three seconds.

nine_k 8 months ago | parent | next [-]

Pray read the third paragraph of my reply :) It specifically mentions a way to make the LED be lit for long enough.

throw646577 8 months ago | parent [-]

Which is not an adjustable method -- without changing the hardware design later in production to just tweak a delay -- and surely causes the LED to slowly fade out?

GTP 8 months ago | parent | next [-]

Would it be so important to be able to tweak the duration later? And why would it be a problem to have the LED fade out?

neop1x 8 months ago | parent | prev [-]

If fade out is such a big problem (which it isn't IMO) there are cheap regulator ICs which can provide constant current.

rightbyte 8 months ago | parent | prev | next [-]

You can design a simple circuit such that both long and short pulses light up the led for atleast 500ms. There is no tradeoff needed to be made at all.

atoav 8 months ago | parent | prev | next [-]

The mentioned one shot circuit does precisely that, in hardware for less cost and 100% non-overridable.

The only time that isolated hardware approach is benefitial in terms of costs would be when you already have to have that microcontroller there for different reasons and the cost difference we are talking about is in the order of a few cents max.

throw646577 8 months ago | parent [-]

Well there is a microcontroller there, isn't there? For the camera.

atoav 8 months ago | parent [-]

But is it isolated? If you can update its Firmware from the computer it isn't.

kirkules 8 months ago | parent | prev [-]

I mean can't you just have the input signal to the light be a disjunction of signals? So it's on if the camera is on OR if some programmatic signal says turn it on?

I don't see why they should be mutually exclusive

beAbU 8 months ago | parent | prev | next [-]

Yet some laptops (Thinkpads ironically) come with a built in camera shutter that's entirely mechanical.

codedokode 8 months ago | parent [-]

And they often cost less than a MacBook for which you need to buy an external shutter.

kazinator 8 months ago | parent | prev | next [-]

Even if the LED were controlled by hardware, merely that you can reprogram the camera firmware on this Thinkpad is troubling. Malicious things can be done without the ability to turn off the LED during recording. Like capture images during legitimate recording, or start recording with the LED on banking on the user not noticing.

Firmware programming should require physical access, like temporarily installing a jumper, or pushing some button on the circuit board or something.

(I don't want to suggest signed images, because that's yet another face of the devil).

Thorrez 8 months ago | parent | prev | next [-]

From this comment: https://news.ycombinator.com/item?id=42260379

it sounds like Apple is doing something similar to what you suggest.

tehwebguy 8 months ago | parent | prev | next [-]

If the LED fails the camera should be inoperable too as a security feature

ComputerGuru 8 months ago | parent | prev [-]

Cameras are now always on, to reduce the latency to taking a picture or scrubbing video feed. You’d need to wire the led to something tied to the data lines, perhaps.

vanilla_nut 8 months ago | parent | next [-]

Source? This seems extremely unlikely to me, running a camera all the time consumes a fair bit of energy and they don't take long to turn on. Unless that's because they're always on?

Regardless, that's a pretty strong claim. I'd love to learn more if you have a link that can back you up!

ewoodrich 8 months ago | parent | prev | next [-]

My M1 Macbook has some pretty extreme latency going from opening Photobooth black screen -> displayed image. Roughly five seconds to useable image.

  :00 Photobooth window open 
  :03 Camera LED lights up 
  :05 First image displayed
saagarjha 7 months ago | parent | prev | next [-]

That's generally not the case. Keeping the camera on requires power and processing its video stream is resource-intensive.

gtirloni 8 months ago | parent | prev [-]

Any links you could share abouy someone confirming this?

aftbit 8 months ago | parent | prev | next [-]

>The actual firmware is indeed flashable, but the part is not a generic part and there are mechanisms in place to verify the image being flashed.

That might make it harder to develop a hack, but one would hope that if the hardware team tied the LED to a hardware signal, it would not matter if the firmware were reflashed.

varenc 8 months ago | parent | next [-]

I believe that it’s not literally hardwired in the sense that powering up the camera also powers up the camera LED, and instead this relies on logic in the hopefully un-flashable camera+LED firmware. Someone correct me if I’m wrong.

You need some logic to enforce things like a minimum LED duration that keeps the LED on for a couple seconds even if the camera is only used to capture one brief frame.

I have a script that takes periodic screenshots of my face for fun and I can confirm the LED stays on even if the camera only captures one quick frame.

axoltl 8 months ago | parent | next [-]

I happen to have some first-hand knowledge around the subject! In 2014 someone did a talk[0] on disabling the camera on some older Macbooks. It was fairly trivial, basically just reflashing the firmware that controlled the LED. I worked on the security team at Apple at the time and in response to this I attempted to do the same for more modern Macbooks. I won't go into the results but the decision was made to re-architect how the LED is turned on. I was the security architect for the feature.

A custom PMIC for what's known as the forehead board was designed that has a voltage source that is ALWAYS on as long as the camera sensor has power at all. It also incorporates a hard (as in, tie-cells) lower limit for PWM duty cycle for the camera LED so you can't PWM an LED down to make it hard to see. (PWM is required because LED brightness is somewhat variable between runs, so they're calibrated to always have uniform brightness.)

On top of this the PMIC has a counter that enforces a minimum on-time for the LED voltage regulator. I believe it was configured to force the LED to stay on for 3 seconds.

This PMIC is powered from the system rail, and no system rail means no power to the main SoC/processor so it's impossible to cut the 3 seconds short by yoinking the power to the entire forehead board.

tl;dr On Macbooks made after 2014, no firmware is involved whatsoever to enforce that the LED comes on when frames could be captured, and no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

0: https://www.usenix.org/system/files/conference/usenixsecurit...

ohhnoodont 8 months ago | parent | next [-]

There seems to be widespread anxiety regarding cameras, but hardly anyone ever talks about microphones. Are conversations not much more privileged information than potentially seeing someone in their underwear?

jamesmotherway 8 months ago | parent | next [-]

"All Apple silicon-based Mac notebooks and Intel-based Mac notebooks with the Apple T2 Security Chip feature a hardware disconnect that disables the microphone whenever the lid is closed. On all 13-inch MacBook Pro and MacBook Air notebooks with the T2 chip, all MacBook notebooks with a T2 chip from 2019 or later, and Mac notebooks with Apple silicon, this disconnect is implemented in hardware alone." [1]

[1] https://support.apple.com/guide/security/hardware-microphone...

KennyBlanken 8 months ago | parent | next [-]

That's what they said about the first gen Facetime cameras. "oooh don't worry, it's controlled in hardware!"

We have no way of verifying that anything they said in that document is true.

jamesmotherway 8 months ago | parent | next [-]

I'm inclined to believe it. If someone managed to prove Apple's lying about it, there would be serious reputational (and other) risks to their business. I also can't imagine how they would benefit from such a fabrication.

That said, I still use "Nanoblock" webcam covers and monitor for when either the camera or microphone are activated.

kimixa 8 months ago | parent | prev [-]

It's clear Apple define "Hardware" as "Not using the main CPU". They've pretty much admitted it's firmware based, otherwise the T2 chip simply wouldn't be involved to be mentioned.

dfox 8 months ago | parent | next [-]

It is implemented in dedicated small CPLD that cannot be flashed by any software means. My understanding of relation to T2/SEP is that this CPLD serves as a kind of "IO expander" for T2/SEP which also hardwires logic like this.

swiftcoder 8 months ago | parent | prev [-]

The T2 chip is mentioned in the quoted passage as an indicator of the architecture version, not necessarily an indicator that the T2 chip is directly involved

ohhnoodont 8 months ago | parent | prev [-]

Obviously the camera is also 'disabled' when the lid is closed regardless of the controlling circuitry. So while that's a good feature, it's not relevant.

Nursie 8 months ago | parent | prev | next [-]

Depends what your threat model is?

Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby. But naked images of Abby can head off into the ether and be propagated more or less forever, turn up on hate sites, be detrimental to careers etc.

If your threat model is leaking company secrets then sure, microphone bad, as is anything having access to any hardware on your machine.

So sure, maybe people ought to be more concerned about microphones as well, rather than instead.

ohhnoodont 8 months ago | parent | next [-]

My point is that the threat model is backwards. The threat associated with a camera is the least severe compared to anything else a malicious person could do with access to your computer. Recored conversations, chats and email, browsing history, etc are all much more likely to result in harm if leaked than a recording of you innocently in your home.

> Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby.

That destroys families, standing within a community, and very often careers.

Nursie 8 months ago | parent [-]

I don't think it is backwards, personally. The threat of public humiliation, and the capability for someone to spy on what you do in your own home, is worse with the camera.

> chats and email, browsing history, etc are all much more likely to result in harm if leaked than a recording of you innocently in your home.

This is far less of an intrusion for most people than recording what they are actually doing in their own home IRL. People know that information can be hacked, they don't expect and react quite differently to someone actually watching them.

> That destroys families, standing within a community, and very often careers.

Yes, but it doesn't stay on the internet forever in quite the same way.

Now I get to some extent what you're saying - aren't the consequences potentially worse from other forms of information leak?

Maybe. It depends on how you weight those consequences. I'd put (for example) financial loss due to fraud enabled by hacking my accounts as far less important than someone spying on me in my own home. Even if they didn't use that to then extort me, and were using the footage for ... uh ... personal enjoyment. I think a lot of people will feel the same way. The material consequences might be lesser, but the psychological ones not so much. Not everything is valued in dollars.

ohhnoodont 8 months ago | parent [-]

I think we may just be bumping into cultural differences here. I grew up in a household were being naked around family members was common. I spend time in clothing-optional spaces. I rarely draw the blinds on my windows, etc. I'm not concerned with what other people think in this way and such images could never be used to extort me. Consider the case of Germany - people there are extremely concerned about their privacy and data protection. At the same time public nudity is an entrenched cultural norm.

It's also known that people are not very good at assessing risk. People are more word about dying at the hands of a serial killer than they are of dying in a car crash or slipping in the shower. I feel you're underplaying the psychological harm of having all of your data crawled through by a creep (that would include all of your photos, sites visited, messages sent, everything).

All I can really say is that if someone gained access to my machine, the camera would be the least of my concerns. That's true in nearly every context (psychological, financial, physical, etc).

rocqua 8 months ago | parent | next [-]

Empirically, most low level extortion does seem to be about leaking video. I would see a threat model based on 'criminal wants to extort me for money'. As more reasonable than 'creep wants to look through my computer for creeping'. And it seems like extortion focusses on video, so that is the bigger threat. Even if it is less invasive.

I presume the reason behind this is that video is much more likely to be re-shared. Sending bob a zip of someone's inbox is unlikely to be opened, and even less likely to be shared with strangers. But send bob a video of Alice, and he might open it. Heck, he might not know what the video is until he opens it. So even if he is decent, he might still see it. And if he is less decent and shares it, strangers are much more likely to actually view it.

Thorrez 8 months ago | parent [-]

I think extortion in the form of "I've encrypted your data, pay to get it back" is much more common. Ransomware. It's scalable, automatable. Extortion of video is harder to automate.

Nursie 8 months ago | parent | prev [-]

I think, though am prepared to be wrong, that you'll probably find yourself in the minority there.

It's not just about nudity and extortion, but someone having access to watch you, whenever they feel like, in your safe space. That sense of violation that people also feel when (for instance) they have been the victim of burglary - the missing stuff is often secondary to the ruined sense of security. There's a vast difference between leaving your curtains open and having someone spying on you from inside your own home.

Is it rational to put this above other concerns? That's a whole different debate and not one I'm particularly interested in. But it explains why people are concerned about cameras over 'mere' data intrusion.

8 months ago | parent [-]
[deleted]
hunter-gatherer 8 months ago | parent | prev | next [-]

I'm not arguing a point here, but I'm curious what the actual number of instances exist where someone is naked or in some other extortionate way (accidently of course) potentially exposed from the position of their webcam. I too would be much more concerned about my microphone, where I know one had conversations that in front of or next to my machine that I wouldn't want "out there". In terms of where my camera is, I woukd imagine they would catch me picking my nose every so often but that's about it.

rocqua 8 months ago | parent [-]

People watch porn on their laptops. Even just your orgasm face would be embarrassing for most people.

joeblubaugh 8 months ago | parent | prev [-]

> Nobody but Abby and Ben care if Ben is caught admitting he cheated on Abby.

This isn't true at all, even for private citizens. Your friends, parents, children, and colleagues are all likely to care.

Nursie 8 months ago | parent [-]

It's very limited, it's certainly not going to be passed around like naked pictures could be.

qingcharles 8 months ago | parent | prev | next [-]

Yes, photos of naked people are used to extort them (usually into just paying the holder to delete them).

https://news.ycombinator.com/item?id=42261730

ohhnoodont 8 months ago | parent [-]

This raises a different but related question. In what world should a victim of a crime be extorted for doing innocent things in their home. If a peeping tom took a photo though a window, could that be used to extort someone?

When people are extorted for these kinds of things it's usually catfishing that leads to sexual acts being recorded. That's not related to cybersecurity.

pfix 8 months ago | parent [-]

Fear of harrasment. You don't want your coworkers see you naked, do you?

edit: s/baked/naked/ :D

sneak 8 months ago | parent | prev [-]

They are, but people aren’t scared of those because they can’t see them staring at them.

II2II 8 months ago | parent | prev | next [-]

> and no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

I may be the oddball here, but that 3 second duration does not comfort me. The only time I would notice it is if I am sitting in front of the computer. While someone snapping a photo of me while working is disconcerting, it is not the end of the world. Someone snapping photos while I am away from the screen is more troublesome. (Or it would be if my computer was facing an open space, which it doesn't.)

axoltl 8 months ago | parent | next [-]

Right, so this is all defense in depth. That LED is sort of the last line of defense if all others have failed, like:

The exploit mitigations to prevent you from getting an initial foothold.

The sandboxing preventing you from going from a low-privileged to a privileged process.

The permissions model preventing unauthorized camera access in the first place.

The kernel hardening to stop you from poking at the co-processor registers.

etc. etc.

If all those things have failed, the last thing to at least give you a chance of noticing the compromise, that's that LED. And that's why it stays on for 3 seconds, all to increase the chances of you noticing something is off. But things had to have gone pretty sideways before that particular hail-mary kicks in.

jstanley 8 months ago | parent | prev | next [-]

OK, but then what? Leave the LED on for 24 hours after you've captured a single frame? At that point the LED isn't really indicating camera usage because you'll just get used to seeing it on all the time whether the camera is in use or not.

II2II 8 months ago | parent [-]

A ranfom thought, that probably won't cover all cases: a second LED or a colour LED. One LED/colour indicates the camera is active, the second can be on for a longer period of time (and perhaps dim as time goes on). I prefer the second LED option since it is better for us colourblind folks, though I suspect there would be more resistance to the idea.

And, of course, covers are an option.

tehjoker 8 months ago | parent | prev [-]

It's strange that none of these companies will include a closable cover for the camera. I got one aftermarket. It is very reassuring since no hacking or accidental misclicks on my part can move the cover.

mkl 8 months ago | parent | next [-]

I've seen HP desktops that have a closeable camera cover, and Lenovo does on some ThinkPads [1], so probably others do too. Laptops usually have very little depth available in the screen part though, which is why most laptop cameras are crappy (exceptions include Surface Pro and Surface Book, which have more depth available and so much better cameras than most, but no cover - at least their camera light is not software controlled).

[1] https://www.businessinsider.com/lenovo-thinkshutter-laptops-...

quacksilver 8 months ago | parent | prev | next [-]

Higher end Lenovos and Dell Latitude / Precision tend to. Was one reason why I went for a Latitude 74XX rather than a 54XX or 34XX when looking at them last time.

sunnybeetroot 8 months ago | parent | prev | next [-]

I had a closable cover and someone shut my laptop with enough force that the cover caused the screen to break. Be careful when closing.

zlsa 8 months ago | parent | next [-]

Was it a built-in camera cover, or a third-party one? Apple specifically (and possibly other manufacturers?) recommends against third-party covers because the tolerance is so close:

https://support.apple.com/en-us/102177

II2II 8 months ago | parent | prev [-]

Sure, that is going.to be true for anything with moving pats. Yet I would also imagine that design and materials are a factor here. Let's face it, these covers aren't exactly common on laptops. There is probably a lack of good design practices for them.

nanomonkey 8 months ago | parent | prev | next [-]

I also purchased a cover for mine, although in a pinch, the removable stickers on fruit work well.

whartung 8 months ago | parent | prev | next [-]

I have a sticky piece of post it note more or less permanently affixed over my camera.

throwaway2037 8 months ago | parent [-]

I can remember when someone spotted tape over Zuckerberg's laptop camera. Ref: https://www.theverge.com/2016/6/21/11995032/mark-zuckerberg-...

cozzyd 8 months ago | parent | prev [-]

My Thinkpad does.

rubatuga 8 months ago | parent | prev | next [-]

Thanks, this is the reason I browse Hacker News

PicardsFlute 8 months ago | parent | prev | next [-]

Thanks for posting this interesting tidbit! I find this kind of knowledge absolutely fascinating!

int_19h 8 months ago | parent | prev | next [-]

Thank you for your work on this! I wish some other large companies took privacy that seriously.

Mistletoe 8 months ago | parent | prev | next [-]

Thank you for doing this.

jorvi 8 months ago | parent | prev | next [-]

I assume you're not longer working on it, but why not just wire it so that:

- The LED is in parallel, but with the sensor voltage supply, not the chip

- Camera sensor idle voltage = low voltage for the LED (be it with stepping if needed)

- Camera sensor active voltage = high voltage for the LED (again, stepping if needed)

- little capacitor that holds enough charge to run the LED for ~3 seconds after camera goes back to idle voltage.

Good luck hacking that :)

axoltl 8 months ago | parent | next [-]

That's basically how this works, but manufacturing electronics at a massive scale requires some more flexibility. For example, capacitors have a pretty large tolerance (sometimes +/- 20%) and LEDs have quite a bit of variety in what voltages they'll work at. So for some people the LEDs might last 3 seconds, for some they might last 5s. Using a capacitor also means the LEDs will fade slowly instead of just turning off sharply.

If the LEDs come from a different supplier one day, who is going to make sure they're still within the spec for staying on for 3 seconds?

(And yes, I have long since parted ways with Apple)

Edit:

And to add on: That capacitor needs time to charge so now the LED doesn't actually come on when the sensor comes on, it's slightly delayed!

jorvi 8 months ago | parent [-]

Thank you for the clarifications. Armchair (well, workbench) engineering strikes again haha!

shiroiushi 8 months ago | parent | prev [-]

You can't drive an LED that way in production electronics: you need to use an LED driver circuit of some kind to ensure the LED has constant current, and also to protect against failure modes. Also, a capacitor large enough to power a daylight-visible LED for 3 seconds is not as "little" as you're thinking; there's likely not enough space in a laptop lid for one of those. A driver circuit would be smaller and thinner.

Agreed, however, that the LED should be controlled by the camera sensor idle vs. active voltage.

KennyBlanken 8 months ago | parent | prev [-]

I've seen a million people parroting "oh now apple fixed it!" and not a single person who has actually verified/proved it. Go on, show my any third party security researcher who has verified this claim via examining the actual hardware.

You'll pardon us all if we don't really believe you, because a)there's no way for any of us to verify this and b)Apple lied about it before, claiming the LED was hard-wired in blah blah same thing, except it turned out it was software controlled by the camera module's firmware.

axoltl 8 months ago | parent | next [-]

I'd love for a third party to verify the claim! I'm just giving you an overview of the work that went into making this a thing, knowing full well you have absolutely no reason to trust me.

The LED being "hard-wired" is a tricky statement to make, and I actually wasn't aware Apple has publicly ever made a statement to that effect. What I can say is that relying on the dedicated LED or "sensor array active" signal some camera sensors provide, while technically hard-wired in the sense there is no firmware driving it, is not foolproof.

trogdor 8 months ago | parent | prev [-]

> Apple lied about it before, claiming the LED was hard-wired in blah blah same thing, except it turned out it was software controlled by the camera module's firmware.

Source?

MaxikCZ 8 months ago | parent | prev | next [-]

A capacitor can hold enough charge to power led for noticable amount of time even if powered for a brief moment, no logic needed

squarefoot 8 months ago | parent | next [-]

I don't think they would waste a high value capacitor just to keep a led lit for longer, also a led directly lit by a capacitor would be noticeable by slowly dimming when the capacitor discharges. It's more likely that the signal driving the led comes out of a monostable implemented in code: pin_on() drives the led on; pin_off() waits n secs then drives the led off.

altairprime 8 months ago | parent | next [-]

This is Apple, so that assertion isn’t guaranteed valid like it would be for non-enterprise HP or Lenovo. They absolutely would invest in a capacitor if that’s what it takes, as they are maximally focused on camera privacy concerns and have made a point of that in their security marketing over time; or else they wouldn’t be allowing hardware security engineers to brag about it, much less talk publicly about it, at all.

EDIT: It’s not just a capacitor, it’s a full custom chip, that can’t be software-modified, that keeps the light on for 3 seconds. https://news.ycombinator.com/item?id=42260379

8 months ago | parent | prev [-]
[deleted]
HeyLaughingBoy 8 months ago | parent | prev | next [-]

Logic on an already existing ASIC is going to be cheaper than a capacitor.

MrDrMcCoy 8 months ago | parent [-]

This is counter-intuitive enough to warrant further explanation.

ale42 8 months ago | parent [-]

If you are designing an ASIC for the camera, you can include all the required logic gates to control the LED for a cost that is close to zero. It wouldn't impact the production cost of the ASIC, whereas a capacitor is an additional item in the BOM (and to be charged it requires current, more than the LED, so the driver in the IC must be bigger).

RA2lover 8 months ago | parent | prev [-]

The trick is to keep using the camera until that capacitor is discharged. I'm pretty sure most cameras can run at voltages below a LED's forward voltage nowadays.

throwaway984393 8 months ago | parent | prev | next [-]

[dead]

aftbit 8 months ago | parent | prev [-]

See then it's not hardwired at all. It is equally vulnerable to a reflash. Apple just did hardware security (i.e. signed firmware) better and also are relying on security through obscurity (its not a publicly available part).

8 months ago | parent [-]
[deleted]
ndiddy 8 months ago | parent | prev | next [-]

The context from the article the parent comment linked is that Mac webcams made prior to 2008 both had the camera LED controlled in firmware and didn't verify the camera firmware blob when it was downloaded into the camera's RAM. The quote you're replying to simply says that Apple solved these security issues by tying the LED to a hardware signal AND verifying the camera firmware blob. The result is still that there's no way to turn on the webcam without making the LED light up.

danielheath 8 months ago | parent | prev | next [-]

AFAIK iOS devices use a tiny firmware on the camera and a larger one on the secure enclave chip.

If you successfully compromise the host OS and also the secure enclave firmware, that might be enough to let you turn on the camera (without vsync) and reconstruct the correct image via later analysis... but at that point you have committed tens of millions to the hack (so you'd better not overuse it or it'll get noticed & patched).

pclmulqdq 8 months ago | parent | prev [-]

Many complex chips have GPIO signals rather than hardwired outputs. That way you can select any [5-10] of [20-100] functions for each pin. As a result, things that you think should be hardwired are controlled by firmware.

izacus 8 months ago | parent | prev | next [-]

Yep, and Apple changed that after some schools were spying on their students through software that could enable cameras on MacBooks without the light: https://en.wikipedia.org/wiki/Robbins_v._Lower_Merion_School...

TheKarateKid 7 months ago | parent | next [-]

I've also read of exploits which found ways to burn out the Macbook LED light by somehow messing with the power being supplied to the webcam without damaging the camera. Thus afterward, the LED light no longer powers on when in use but the camera still works.

saagarjha 7 months ago | parent | prev [-]

Your Wikipedia article disagrees with the claim that it could disable the light.

jonplackett 8 months ago | parent | prev | next [-]

I wonder how quickly it turns on/off as per Gruber’s worry - if you just record a single frame would it even be visible if looking right at it?

Tempest1981 8 months ago | parent [-]

Below, axoltl writes:

> no firmware is involved in enforcing the LED stay on for 3 seconds after a single frame is captured.

https://news.ycombinator.com/item?id=42260379

jonplackett 8 months ago | parent [-]

That is quite clever! Thanks

makeitdouble 8 months ago | parent | prev | next [-]

While Apple made a laudable effort in this design, sadly it requires thoughtful care and design at every iteration. Typically the iPhone team couldn't pull it off and the only official claim is for macbooks.

I think it's simpler to assume that most devices can be hacked and the LED indicator isn't infailable than to always keep in mind which device lines are supposed to be safe and which ones aren't.

danieldk 8 months ago | parent [-]

Apparently it was purely in software on iPhone/iPad. However, starting with the iPhone 16 and M4 iPad Pro, the LED indicator is rendered by a separate secure exclave:

https://www.tomsguide.com/phones/iphones/iphone-16s-a18-chip...

https://mastodon.social/@_inside/112552696723119626

saagarjha 7 months ago | parent [-]

That is purely in software.

dkga 8 months ago | parent | prev | next [-]

Do you know if the same occurs in iPhones? That was always my assumption, but seeing a Mac-only response makes me wonder if it is addressing a Mac/only question or if it’s applicable only to Macs.

accrual 8 months ago | parent | prev | next [-]

> My concern would be a situation where a frame is captured so the LED is lit only for a very brief period of time.

Maybe enable a pre-charged capacitor to the LED whenever the circuit is activated? A "minimum duty cycle" for the LED might help solve this.

wseqyrku 8 months ago | parent | prev | next [-]

Yeah, the camera needs a physical lid.

Anna3321AQ 8 months ago | parent | prev [-]

[dead]