your Computer Mouse Could Be Spying on Your Conversations, New Research Reveals
Researchers have demonstrated a novel method of eavesdropping using only the vibrations captured by a computer mouse, raising concerns about potential security vulnerabilities. A study published on Arxiv.org details how artificial intelligence can decipher speech from these subtle movements, even in a quiet room.
The technique relies on exploiting the tiny vibrations transmitted through a desk when someone speaks. these vibrations are picked up by the mouse’s sensor and, when analyzed with specialized software, can be reconstructed into intelligible speech. The success of this “acoustic side-channel attack” hinges on specific hardware capabilities.
Researchers found a mouse resolution of at least 20,000 pixels per inch (dpi) is crucial for capturing the necessary detail. this is significantly higher than the 1,000 to 4,000 dpi common in standard mice, limiting the vulnerability to users of ultra high-end models, particularly those designed for video games. The higher the resolution,the more minute vibrations the mouse detects.
Beyond resolution, a high polling frequency – the rate at which the mouse reports its position to the computer – is also essential. The study indicates a frequency of around 8000 Hz is needed for accurate readings, compared to the 125, 500, or 1000 Hz typically found in older or basic mice. Some high-end gaming mice reach 4000 or, rarely, 8000 Hz. Mice identified as meeting these criteria include the Razer Viper 8KHz, the ROG Harpe Ace Extreme, the Burst II Pro and the MACHENIKE L8 Pro.
The surroundings also plays a critical role.Researchers determined that a desk less than 3 cm thick, constructed from wood or metal, provides the optimal surface for vibration transmission. Thicker desks dampen vibrations, hindering the attack. Crucially, the target cannot be using a mouse pad, as it blocks the capture of vibrations.The mouse must also remain stationary during the conversation; movement interferes with accurate data collection.
This research highlights a previously unknown avenue for potential surveillance and underscores the need for further investigation into the security implications of seemingly innocuous hardware.