![]() |
Disabling the built-in microphone for security reasons
Though built-in laptop cameras can be easily obscured with tape or a sticker, there seems to be a plethora of information available regarding disabling them, and yet none pertaining to microphones.
Is there some way to disable the built-in Macbook microphone, or the ones in other sorts of laptops, for that matter? I've changed the input settings to Line In instead of the internal mic and it no longer appears to be picking up sound, but I imagine this could be easily overridden. Thanks for your time. |
I'm interested to know what "security problems" you think the microphone might cause.
Worst case: someone has hacked your Mac so that everything is recorded and the output sent over the Internet to a third party. This is essentially no different from someone hacking your Mac and installing a keylogger or any other eavesdropping software. General security precautions for a laptop include: 1. Require a login at boot. 2. Require password to end screen saver. 3. Don't run an admin account for your daily work. You could also install Little Snitch to stop outgoing internet connections. You could try changing the permissions of the preference file that stores the audio settings. I tried changing my Sound settings and looking to see what plist got modified, but couldn't find anything. Perhaps the settings are stored in PRAM directly. |
Quote:
I also do actually have Little Snitch, and my screensaver/login is password protected, though there's no prompt at boot. |
Quote:
Are you suggesting that someone can eavesdrop on the mic, without physical access to the computer, when the mic is selected as the current input but not actually recording anything? There's a green light that goes on when the camera is on, right next to it, which is a bit of a giveaway. A couple of Google searches for various terms doesn't yield much. This thread is third on one of them. |
I dont believe that the camera or mic can be used w/o your consent, as long as you are securely on the net.
|
Quote:
The only thing I've discovered is that Flash Player can use your camera or mic, but this is disabled by default in the settings. And frankly, if you're that serious about security, you wouldn't have Flash on your Mac anyway.:p Perhaps you could change the permissions of the Sound preference pane so that only the admin group can read it. Though again, I can't imagine how the sound input settings might become "over-ridden". If some malware is already in a position to do that, you've got bigger problems than people hearing what you say to your laptop. |
You can find most of the hardware in /System/Library/Extensions
Just find the proper kext file and rename it or move it to a different location and it should disable the hardware in question |
Rather than renaming or moving the kext, you could try terminating it with kextunload (see man page for syntax). Apple's recent tendency to code-sign core components has made it more difficult to tinker with a lot of the lower levels of the system.
But which kext controls the microphone? As tlarkin suggests, start poking around in /System/Library/Extensions for audio-related kexts. Note that often kexts contain other kexts, so you may need to drill down a few times to find a likely package. Scanning this directory on a Leopard machine for files containing the word "microphone" reveals these suspects: /System/Library/Extensions/AppleHDA.kext/Contents/MacOS/AppleHDA /System/Library/Extensions/AppleHDA.kext/Contents/PlugIns/AppleMikeyDriver.kext/Contents/MacOS/AppleMikeyDriver /System/Library/Extensions/AppleOnboardAudio.kext/Contents/MacOS/AppleOnboardAudio /System/Library/Extensions/SM56KUSBAudioFamily.kext/Contents/PlugIns/AppleSM56KUSBAudio.kext/Contents/MacOS/AppleSM56KUSBAudio /System/Library/Extensions/AppleUSBAudio.kext/Contents/MacOS/AppleUSBAudio Some of these kexts could have been added by third-party apps, so your list may differ. Good luck. |
In the Sound Preference Pane, you can set the input level of the microphone to zero. Certainly safer than fiddling with kexts.
|
Quote:
If this weren't the case I'd suggest replacing any instances of the word microphone with webcam in your queries, since, as noted in the first post, people tend to be more worried by that, and it's just naturally assumed that the two will be used in conjunction. Quote:
Quote:
Quote:
Quote:
Quote:
How risky is messing with kexts, exactly? |
Quote:
Even if you disabled the kext files, there would be nothing preventing the hacker from re-enabling them and hiding them from you. Most cases of webcam snooping are due to someone having physical access to the computer while the owner is away/unaware. Again, if a person had physical access and was able to plant spy software on your Mac, they could easily re-enable the microphone, and possibly even hide the fact that the Mic is active. Quote:
Moving them around or modifying them could screw up your system, even if it doesn't seem like the kext you are removing is related to anything else. I recall a post where someone wanted to disable USB ports on a Mac running as a display/slideshow/kiosk for 'security' purposes. The person messed around with the IO kext and it ended up causing the Mac to go into a kernel panic (complete system crash), and he had to reinstall everything. The only other option would be to take your Mac and fool around with the various electronic components inside it This is not recommended, as it could do way more damage than simply removing kext files. I believe the best balance between privacy and stability would simply be to not let people who you do not trust use your Mac, and to not download unsafe programs from the internet. |
I work for a school district in a 1:1 deployment so 6,000 macbooks I help manage. Plenty of students get in trouble and are banned from using their built in camera and I have created policies to disable them.
I simply create a folder called disabled_kext and move the kext in there. It can be tricky because some are tied together and some may be third party. I haven't had it crash a system or anything like that yet. On my 3rd year of the 1:1. |
Quote:
So far as kexts are concerned, I suppose it's good that I was a bit leery of poking around in such things. My laptop is also rather old and doesn't need any help falling apart, plus electronics aren't exactly my area of expertise, so just ripping the microphone out altogether was never exactly part of the plan, no. Anyway, thanks for the info. |
Quote:
|
Quote:
Irreparable, no. But is it possible to cripple your system in such a way that you would need to load the OS anew, yes. Experiments on kexts are best carried out on a test machine. But honestly, what benwiggy and ThreeDee are saying is true: anything that you can do in software to stop someone can be reversed in software--even tlarkin's disabled_kext can be reenabled, I would imagine, by someone with the know-how and desire to do it. The only irreversible solution (and even this, too, can be reversed by anyone with physical access) is to jab a screwdriver right through the microphone or start snipping wires--and those approaches are emphatically not recommended. |
Quote:
|
Why not try the simple fix?
A small piece of tape, strategically placed over the microphone, would muffle any sound so much as to make the microphone unusable. Same for the built-in camera. Even if remotely turned on (somehow), then nothing could be seen, and any sound would likely be indecipherable. |
Quote:
|
Why not? The built-in microphone gets sound input through a tiny hole on the edge of the display. Cover that hole with tape, and no sound gets through, other than vibrations that would indirectly be transmitted though the case. That would shoot any sensitivity down to nothing. The camera needs light to work. So, cover with nice black vinyl tape, and you get nothing at all, even if the camera is turned on.
Seems simple enough. And, you don't need to worry about some future system update that reinstalls your microphone .kext files without you knowing about it. |
Quote:
|
Well, you could always test it by trying to record something with tape over the mic. If you hear muffled/distorted noise, you know the tape works.
|
Quote:
I do come to this forum to help people; but also to be helped and learn more. It's an exchange of information. From my understanding (which may be wrong), there is nothing inherently insecure about having a mic and camera on your own laptop. And that seems to be what others are saying, too. The reason for my questioning you about the security risks, was to make you consider whether disabling the mic is something that is really necessary. As others have said, it is possible for someone with physical access to the machine to engineer something; or perhaps for some trojan to turn on the mic and relay it. But as I said in my first post, this is only one of a number of things that they could do. By that point, they would have control of your ENTIRE machine. A keylogger that detected your passwords is much more fruitful and likely, from a criminal point of view, than listening to what you might be saying to someone else whilst you're in front of your laptop. |
Quote:
The desire to finally do something about my suspicion of built in recording devices came a bit out of the blue, and although I'm certain I've read many articles detailing instances in which they were used for insidious purposes, that was awhile ago, and I don't exactly have a means by which to direct people to them at this point. Though I'm sure most of these cases occurred in poorly maintained windows machines, the knowledge that such a thing can and does occur is still unsettling. Happened to one of my cousins years back, in fact, with a rather psychotic ex. You always hear people going on about how crazy their exes were, but this guy actually deserved the title for once. I was young at the time and didn't find it particularly interesting, so I'm not entirely clear on details like why they didn't press charges, or how they knew it was him. Perhaps they simply couldn't prove it, and that was their reasoning. Either way, I believe he had originally intended to procure blackmail (or maybe masturbation) material, but I guess when a few days passed without anything incriminating happening in front of the cam, he got frustrated and resigned to just freaking her out by making his control of the computer known. Looking back on it now, it sounds like it was controlled remotely, probably with Back Orifice or something of that nature, but it isn't as though I can be entirely sure. While I know now that I'm very unlikely to be at risk of such a thing by simple virtue of practicing basic security and computer literacy, it's still a troubling thought I figured may as well not remain unaddressed. EDIT: Oh, looks like adding Back Orifice to the search query turns up some fairly recent results. http://www.slate.com/id/2215499/pagenum/all/ http://i48.tinypic.com/1zr051w.jpg |
Quote:
It's not hostile to reply "Really? I find that surprising and haven't heard anything about that. Please tell me more." But apologies nonetheless. Instead, I could have asserted "You have nothing to worry about. Don't bother." But you might have some evidence that this was wrong, so questioning seemed prudent. Back Orifice is Windows malware. It's certainly easier to take control of a Windows box, and the vast majority of malware is targeted at Windows OS. Sorry to hear about your cousin. If a relationship goes sour, and one of the parties had access to your computer, or had keys to your house, or other access, then bad things may occur. |
Quote:
|
If someone obtains physical access to your Mac laptop they can remotely exploit it, and yes you can control the camera from the command line. A guy got busted doing this to college women (he was some sort of IT, like geek squad or something) and their laptops and he got busted because a girl noticed the green light kept coming on so she started to google what that meant.
Another example is someone in NYC got their Mac stolen and they used back to my Mac or log me in or some sort of web based remote desktop and logged into their mac remotely and took a snap shot of the thief with the camera and got their laptop back. There is an app called iAlertU which is like a "car alarm" type app for your Mac laptop, which also uses the camera and will email you snapped pics when the alarm is triggered. Now, is it heavily documented? No, but it is out there, and yes you can probably use those in some very strange and esoteric conditions to exploit someone's security. Whenever I get any macbook back from repair the first thing I do is image it. Not that I don't trust my third party guys that do all the warranty repair, I just don't know who is all involved and since it is third party I just image it as standard procedure. |
Quote:
I hate to necro the thread, but I was just sent this link, and I was wondering if someone could provide an explanation... http://forums.somethingawful.com/sho...readid=3238852 EDIT: Oh, looks like it might be a bit NSFW, if you're at work or something. |
Quote:
You can't use Google to turn on someone's web camera. |
Quote:
Seems odd that so many businesses would have such bad security, though. |
Quote:
I was taught years ago that "a phone call is not a private conversation". This was in the UK in the 70s. Whether legally accurate or not, it's still sage advice and can be applied to anything you do online. Once it has left your computer; the world has it. |
Quote:
|
| All times are GMT -5. The time now is 09:42 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.