{"id":17544,"date":"2017-07-04T09:00:40","date_gmt":"2017-07-04T07:00:40","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=17544"},"modified":"2017-07-17T12:15:49","modified_gmt":"2017-07-17T10:15:49","slug":"microphone-patent","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/microphone-patent\/17544\/","title":{"rendered":"Is someone eavesdropping on you? Not on our watch!"},"content":{"rendered":"<p>It\u2019s not paranoia if they\u2019re really out to get you. Remember when people mocked others for covering up their webcams? After <a href=\"https:\/\/www.kaspersky.com\/blog\/2ch-webcam-hack\/11961\/\" target=\"_blank\" rel=\"noopener nofollow\">reading the news<\/a>, no one was laughing; instead, they began covering up their webcams too \u2014 or using Kaspersky Internet Security\u2019s feature that <a href=\"https:\/\/www.kaspersky.com\/blog\/webcam\/5436\/\" target=\"_blank\" rel=\"noopener nofollow\">blocks unauthorized access to webcams<\/a>.<\/p>\n<p>But let\u2019s not forget microphones. Tape doesn\u2019t block sound, and moreover, persistent malefactors can even <a href=\"https:\/\/www.kaspersky.com\/blog\/voice-recognition-threats\/\" target=\"_blank\" rel=\"noopener nofollow\">eavesdrop through speakers<\/a>, which have essentially the same construction as microphones. Disabling the microphone with system software is no solution: an app can turn it back on.<\/p>\n<p>Again, Kaspersky Internet Security comes to the rescue with <a href=\"https:\/\/www.kaspersky.com\/blog\/voice-recognition-threats\/\" target=\"_blank\" rel=\"noopener nofollow\">patented technology<\/a> that features system-level protection from eavesdropping. Here\u2019s how it works.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/03125909\/audio-patent-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/03125909\/audio-patent-featured.jpg\" alt=\"Is someone eavesdropping on you? Not on our watch!\" width=\"1460\" height=\"960\" class=\"aligncenter size-full wp-image-17377\"><\/a><\/p>\n<h3>The problem<\/h3>\n<p>First, a bit of background: More than one application can create sounds simultaneously \u2014 ever been watching a movie when a notification took you right out of the action? To handle simultaneous playback, an operating system operates with audio streams, and a system component controls the streams. If an app wants to make a sound, it creates an audio stream. <\/p>\n<p>Audio streams can be linked to different devices, such as speakers or a microphone. Several simultaneous audio streams can receive data from a microphone, just like several streams can access speakers at the same time.<\/p>\n<p>Looking at it from the other side, a microphone cannot create different streams for different applications; it is just a passive device that captures every sound it picks up. So all those streams it creates are identical. At the operating-system level, no protection exists against unauthorized access to the microphone: An app can create an audio stream, hook itself up to the microphone, and capture all that it \u201coverhears.\u201d<\/p>\n<h3>The solution<\/h3>\n<p>What can be done? Go to the source and trace the creation of new audio streams! That is what Kaspersky Internet Security does (of course, Total Security does it as well). The Privacy Protection component, which also includes the feature that blocks access to your webcam, is capable of tracing the creation of new audio streams as well.<\/p>\n<p>Among other things, the component investigates which app is creating a new stream. It isn\u2019t enough simply to block access to the microphone: To protect users from malicious applications but ensure legitimate applications retain access to the microphone, we have to determine the nature of any app requesting access to the microphone. From there, it\u2019s a simple matter of allowing or denying access.<\/p>\n<p>If the program in question is a trusted app from a well-known developer with a good reputation \u2014 and it doesn\u2019t appear in antivirus databases \u2014 then its attempts to generate audio streams will not be blocked. However, if something is off about the app, such as a shady developer, a blemished reputation, or, worse, noted outright malicious actions, then Privacy Protection will trace the request for generating an audio stream and simply eliminate it.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"2551\">\n<p>We have implemented this technology in <a href=\"https:\/\/store.kaspersky.com\/store\/kaspersk\/en_IE\/buy\/productID.320853100\/quantity.1\/Currency.USD?cid=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___&amp;affiliate=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security 2017<\/a>, and we were recently granted a patent for the technology. Therefore, nobody can eavesdrop on those who use our products. This technology is enabled by default, so you do not need to activate it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here\u2019s how it works.<\/p>\n","protected":false},"author":40,"featured_media":17545,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,1789],"tags":[2567,729,180,909,1699,1083,2513],"class_list":{"0":"post-17544","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-technology","9":"tag-eavesdropping","10":"tag-espionage","11":"tag-kaspersky-internet-security","12":"tag-kaspersky-total-security","13":"tag-patents","14":"tag-technologies","15":"tag-under-the-hood"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microphone-patent\/17544\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/microphone-patent\/8736\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/microphone-patent\/4764\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/microphone-patent\/11737\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/microphone-patent\/11275\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/microphone-patent\/13639\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/microphone-patent\/13682\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microphone-patent\/17916\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/microphone-patent\/3636\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microphone-patent\/17376\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/microphone-patent\/9253\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/microphone-patent\/9473\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/microphone-patent\/7022\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/microphone-patent\/13860\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/microphone-patent\/16779\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microphone-patent\/17563\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/technologies\/","name":"technologies"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=17544"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17544\/revisions"}],"predecessor-version":[{"id":17546,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17544\/revisions\/17546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/17545"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=17544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=17544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=17544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}