Researchers demonstrate SPEAKE(a)R, a technique that repurposes computer speakers into microphones to capture audio covertly. The method exploits hardware vulnerabilities and has implications for privacy and security in air-gapped systems. The paper highlights both offensive and defensive applications of the attack.
Background
Hardware-based side-channel attacks have gained attention for bypassing traditional software defenses, especially in secured environments. Researchers often explore unconventional methods to exfiltrate data from isolated systems.
- Source
- Hacker News (RSS)
- Published
- Apr 19, 2026 at 04:45 PM
- Score
- 7.0 / 10