{"id":14921,"date":"2025-10-08T17:12:51","date_gmt":"2025-10-08T17:12:51","guid":{"rendered":"https:\/\/newestek.com\/?p=14921"},"modified":"2025-10-08T17:12:51","modified_gmt":"2025-10-08T17:12:51","slug":"computer-mice-can-eavesdrop-on-private-conversations-researchers-discover","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14921","title":{"rendered":"Computer mice can eavesdrop on private conversations, researchers discover"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, researchers from the University of California, Irvine, have shown in a new proof-of-concept demonstration.<\/p>\n<p>Given the catchy name \u2018Mic-E-Mouse\u2019 (Microphone-Emulating Mouse), the ingenious technique outlined in <em><a href=\"https:\/\/arxiv.org\/html\/2509.13581v1#S10\" target=\"_blank\" rel=\"noreferrer noopener\">Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors<\/a> <\/em>is based on the discovery that some optical mice pick up incredibly small sound vibrations reaching them through the desk surfaces on which they are being used.<\/p>\n<p>These vibrations could then be captured by different types of software on PC, Mac or Linux computers, including non-privileged \u2018user space\u2019 programs such as web browsers or games engines or, failing that, privileged components at OS kernel level.<\/p>\n<p>Although the captured signals were inaudible at first, the team were able to enhance them using Wiener and neural network statistical filtering to boost signal strength relative to noise.<\/p>\n<p>As the <a href=\"https:\/\/www.youtube.com\/watch?v=CY7Z37Ul8aQ\" target=\"_blank\" rel=\"noreferrer noopener\">video demonstration<\/a> of this process shows, this made it possible to extract spoken words from an eavesdropped data stream that at first sounded impossibly muffled.<\/p>\n<p>\u201cThrough our Mic-E-Mouse pipeline, vibrations detected by the mouse on the victim user\u2019s desk are transformed into comprehensive audio, allowing an attacker to eavesdrop on confidential conversations,\u201d the researchers wrote.<\/p>\n<p>Moreover, they said, this type of attack would be undetectable by defenders: \u201cThis process is stealthy since the vibrations signals collection is invisible to the victim user and does not require high privileges on the attacker\u2019s side.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"side-channel-weakness\">Side channel weakness<\/h2>\n<p>The technique is the latest example of a side channel attack as evidenced by a growing body of research looking at how components used for one purpose \u2014 a mouse, say \u2014 can inadvertently leak information in an unintended way.<\/p>\n<p>But is an attack based on this methodology possible under real-world conditions?<\/p>\n<p>What makes this attack practical is the sensitivity of today\u2019s mice, both their high polling rate (the frequency at which they sample movement, measured in kHz), and the resolution with which they detect movement, measured in dots per inch (DPI).<\/p>\n<p>The higher the polling rate and resolution, the more sensitive the mice become to sound. \u201cUltimately, these developments entail an increased usage of vulnerable mice by consumers, companies, and government entities, expanding the attack surface of potential vulnerabilities in these advanced sensor technologies,\u201d said the researchers.<\/p>\n<p>However, there are important caveats that limit the scope of Mic-E-Mouse. The noise level of the environment being eavesdropped upon must be low, with desks no more than 3cm thick, and with the mouse mostly stationary to isolate voice vibrations.<\/p>\n<p>The researchers also used mice with a DPI of at least 20,000, significantly above that of the average mouse in use today.<\/p>\n<p>Under real-world conditions, extracting voice data would be possible but challenging. Attackers would likely only be able to capture some conversation, rather than everything being said.<\/p>\n<p>Another weakness is that defending against it wouldn\u2019t be difficult: using a rubber pad or mouse mat under a mouse would stop vibrations from being picked up.<\/p>\n<p>Nevertheless, the technique demonstrates that mice should now be added to the growing list of computer peripherals susceptible to side channel data extraction under specific circumstances.<\/p>\n<p>Previous research on audio side-channel attacks has largely focused on moving data the other way, from electrical signals to sound, as a way to escape air-gapped networks \u2014 for example through the use of <a href=\"https:\/\/arxiv.org\/pdf\/1803.03422\">speakers as both transmitters and receivers<\/a>, or controlling the sounds generated by <a href=\"https:\/\/arxiv.org\/pdf\/2005.00395\">computer power supplies<\/a> (PSUs).<\/p>\n<p>Conventional eavesdropping techniques involve placing <a href=\"https:\/\/www.csoonline.com\/article\/546296\/microsoft-subnet-extreme-tech-for-covert-audio-surveillance.html\">incredibly small sensors<\/a> in valuable locations, which is why <a href=\"https:\/\/www.computerworld.com\/article\/1457583\/vatican-battles-eavesdroppers.html\">Papal Conclaves<\/a> have for at least 20 years carefully swept all objects in the Sistine Chapel for covert listening devices.<\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, researchers from the University of California, Irvine, have shown in a new proof-of-concept demonstration. Given the catchy name \u2018Mic-E-Mouse\u2019 (Microphone-Emulating Mouse), the ingenious technique outlined in Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors is based on the discovery that some optical mice pick up incredibly small&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14921\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14921","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14921"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14921\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}