Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth
Privacy Online News ^ | 6/18/15 | Rick Falkvinge

Posted on 06/23/2015 12:58:49 PM PDT by LibWhacker

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth

Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.

It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".

chrome-voicesearch

Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.

A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.

Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.

This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.

Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.

Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):

1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.

2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.

3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.

If you think this is an excusable and responsible statement, raise your hand now.

Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.

This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.

Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )

Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.

Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.

Privacy remains your own responsibility.



TOPICS: Crime/Corruption; Culture/Society; News/Current Events
KEYWORDS: bedroom; black; blackbox; box; bug; chrome; eavesdrop; evil; google; goolag; goolagspy; listening; privacy; room; spy; stasi; tap; wiretap; your
Navigation: use the links below to view more comments.
first 1-2021-32 next last

1 posted on 06/23/2015 12:58:49 PM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies]

To: LibWhacker

Don’t have a microphone.


2 posted on 06/23/2015 1:02:39 PM PDT by AppyPappy
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy

Ding!


3 posted on 06/23/2015 1:03:58 PM PDT by Crazieman (Article V or National Divorce. The only solutions now.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Crazieman

Laptops have a microphone but I use a desktop for gaming at home.


4 posted on 06/23/2015 1:05:44 PM PDT by AppyPappy
[ Post Reply | Private Reply | To 3 | View Replies]

To: AppyPappy

Open it up, clip the wire. Problem solved.


5 posted on 06/23/2015 1:07:03 PM PDT by Crazieman (Article V or National Divorce. The only solutions now.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: LibWhacker

Go into Chrome and go to settings. You’ll see a setting for “Enable OK Google to do a voice search”.

Hence the microphone setting.


6 posted on 06/23/2015 1:08:47 PM PDT by AppyPappy
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Well now. It is possible that the person who downloaded and installed the software gave permission to be recorded. Who reads and understands all those “I agree” forms from software companies, anyway?

But a person who is in the room with you and is recorded did not agree to be recorded. This feature would obviously violate the many states’ law requiring “2 party consent” for audio recording. I am not sure what kind of liability this opens them up to. Doubtful anyone at Google would be arrested. I wonder how much the damages in civil court could be though.


7 posted on 06/23/2015 1:09:06 PM PDT by monkeyshine
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Man I hate google


8 posted on 06/23/2015 1:09:39 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

the default install will still wiretap your room without your consent

That is a NSA requirement.


9 posted on 06/23/2015 1:16:12 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Yup, sounds like something Google would do.


10 posted on 06/23/2015 1:17:03 PM PDT by MNDude (God is not a Republican, but Satan is certainly a Democrat.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

11 posted on 06/23/2015 1:20:59 PM PDT by Red Badger (Man builds a ship in a bottle. God builds a universe in the palm of His hand.............)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker; LucyT

Stasi Ping!


12 posted on 06/23/2015 1:21:09 PM PDT by KC_Lion (PLEASE SUPPORT FR. Donate Monthly or Join Club 300! G-d bless you all!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar; NorwegianViking; ExTexasRedhead; HollyB; FromLori; EricTheRed_VocalMinority; ...

The list, Ping

Let me know if you would like to be on or off the ping list

http://www.nachumlist.com/


13 posted on 06/23/2015 1:22:09 PM PDT by Nachum (Obamacare: It's. The. Flaw.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: MNDude

14 posted on 06/23/2015 1:23:12 PM PDT by Red Badger (Man builds a ship in a bottle. God builds a universe in the palm of His hand.............)
[ Post Reply | Private Reply | To 10 | View Replies]

To: AppyPappy
You’ll see a setting for “Enable OK Google to do a voice search”.

I don't have Chrome (and never shall now) and certainly don't know more about hardware and software than you do, AppyPappy, but isn't he trying to say a software switch is not sufficient?

Anyone who wants to listen in on what's going on in your home/office, and has the technical know-how, can hack in and change the switch unless you have no microphone (as you pointed out earlier) or have a physical on/off switch on the microphone.

15 posted on 06/23/2015 1:30:14 PM PDT by LibWhacker ("Every Muslim act of terror is follow by a political act of cover-up." -Daniel Greenfield)
[ Post Reply | Private Reply | To 6 | View Replies]

To: AppyPappy

“Don’t have a microphone.”

Don’t use google chrome or any of their products.


16 posted on 06/23/2015 1:33:35 PM PDT by CodeToad (Islam should be outlawed and treated as a criminal enterprise!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: minnesota_bound; Old Sarge; EnigmaticAnomaly; Califreak; kalee; TWhiteBear; freeangel; ...

.

G00gle Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth

the default install will still wiretap your room without your consent

That is a NSA requirement. .

17 posted on 06/23/2015 1:43:46 PM PDT by LucyT
[ Post Reply | Private Reply | To 9 | View Replies]

To: LibWhacker

Once again, Google shows that it is firmly ensconced in Obama’s alimentary canal.

I do not use google, on any device.


18 posted on 06/23/2015 1:53:59 PM PDT by Terry L Smith
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Privacy is dead.

Most of us carry a tracking device that we pay to have. It’s called a cell phone. (Your phone has to know about where you are for it to even work, and if you have GPS, it knows exactly where you are.) The mike on a phone can be turned on remotely without you even knowing.

Then there are “smart” TVs, gmae systems with cameras, motion trackers, and mikes, laptops with cameras and micropones, etc., etc.


19 posted on 06/23/2015 2:00:51 PM PDT by piytar (Good will be called evil and Evil will be called good.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: piytar

Don’t tell that to Maxwell Smart and the Chief..

The Cone of Silence was impenetrable..

as was the american electorate in 2008 and 2012..


20 posted on 06/23/2015 2:17:06 PM PDT by NormsRevenge (SEMPER FI!! - Monthly Donors Rock!!)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson