Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Chromium Debian Privacy Software Technology

Google Criticized For 'Opaque' Audio-Listening Binary In Debian Chromium 85

An anonymous reader writes: Google has fallen under criticism for including a compiled audio-monitoring binary in Chromium for Debian. A report was logged at Debian's bug register on Tuesday noting the presence of a non-auditable 'hotword' module in Chromium 43. The module facilitates Google's "OK, Google" functionality, which listens for that phrase via a Chrome user's microphone and attempts afterwards to interpret the user's instructions as a search query. Matt Giuca from the Chromium development team responded after the furore developed, disclaiming Google from any responsibility from auditing Chromium code, but promising clearer controls over the feature in release 45.
This discussion has been archived. No new comments can be posted.

Google Criticized For 'Opaque' Audio-Listening Binary In Debian Chromium

Comments Filter:
  • I can see why they'd be less than transparent about it..

    • by jellomizer ( 103300 ) on Friday June 19, 2015 @09:58AM (#49944765)

      Oh come on, you all know those engineers at Google, actually wrote that code in a HEX editor in straight machine code. It is completely open source. Just because you don't know machine code, doesn't mean Google is violating open source methodology. Say you didn't know APL and I created an APL program, and gave you the source. Am I not sharing the source with you?

      FYI: Tongue in cheek.

    • I can see why they'd be less than transparent about it..

      Nah, not the NSA. They spy for the one spying organzation bigger than the NSA: Google ;)

    • i, for one, like the idea of this feature. i just wish it would listen for a "f*ck you google" keyphrase and then immediately delete all google services related cookies from my browser. the "f*ck you google" subroutine should work completely locally but i'm ok with it increasing some kind of counter on google's servers. they should be able to see how many million people said "f*ck you google" this month.

  • by nefus ( 952656 ) on Friday June 19, 2015 @09:14AM (#49944345) Homepage
    So is the microphone on by default in windows? How would you turn it off?
    • unplug it, or if its embedded, remove the audio driver for it, or set the 'volume' control so it cannot hear anything anyway. And put some tape over the little hole it listens through.

      Now.. good luck doing that on your phone.... best just to remove the app (if you can) or trust Google not to have slipped this stuff into Android as part of its voice activation feature (for your convenience, of course)

      • by swillden ( 191260 ) <shawn-ds@willden.org> on Friday June 19, 2015 @09:53AM (#49944711) Journal

        unplug it, or if its embedded, remove the audio driver for it, or set the 'volume' control so it cannot hear anything anyway. And put some tape over the little hole it listens through.

        Now.. good luck doing that on your phone.... best just to remove the app (if you can) or trust Google not to have slipped this stuff into Android as part of its voice activation feature (for your convenience, of course)

        Hotword detection is optional in Android. If you don't like it, just turn it off.

        • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Friday June 19, 2015 @10:31AM (#49945045) Homepage Journal

          Hotword detection is optional in Android. If you don't like it, just turn it off.

          The software which provides hotword detection on Android is also not auditable. How do you know it doesn't turn itself on when it detects that you're not looking at it, or monitoring it via adb? Oh no, I don't really think that it does either, but it's precisely the same concern as on Debian. You'd have to not install the google services to be sure you were avoiding it.

          • by swillden ( 191260 ) <shawn-ds@willden.org> on Friday June 19, 2015 @12:24PM (#49946177) Journal

            Hotword detection is optional in Android. If you don't like it, just turn it off.

            The software which provides hotword detection on Android is also not auditable. How do you know it doesn't turn itself on when it detects that you're not looking at it, or monitoring it via adb? Oh no, I don't really think that it does either, but it's precisely the same concern as on Debian. You'd have to not install the google services to be sure you were avoiding it.

            If that's your level of paranoia, you're lost, and omitting the Google services doesn't help.

            The fact is that you implicitly and deeply trust all the companies in the production pipeline for the networked electronic devices you use, because absolutely any one of them can easily arrange for whatever sort of backdoor they want. It's a little tougher for the hardware component vendors, I'll grant, but if they do the work they're in the best position of all to compromise your security without any possibility that you could find it.

            With Android specifically, though, I'm interested in ideas for how we can make the system more transparent. We can't do anything about hardware-level compromises, but I'd like it if the upper layers were more auditable -- and note that having access to source code that purports to be what's running on the device doesn't get you there.

            One idea I've been toying with is a framework-level network tap that allows you to divert a copy of every bit that your phone sends or receives, via network, Wifi, bluetooth, NFC or USB, for your perusal and examination. Since most apps use the framework APIs for SSL, it should be possible to snarf this data before it's encrypted, too. Of course, there's a big downside: if this single data collection point exists, it will be a tremendously attractive target for compromise by other parties who want to see what your device sends or receives.

            You're a smart person, do you have any ideas for what Android could do to make its operations more transparent? We can't achieve perfection, but if we could get it to the point where Google or anyone else in the supply chain would have to do something which is obviously and solely intended to hide their actions in order to exfiltrate private data, that would be great.

            Note that this is not an idle question. I'm a member of the Android security team, and in a position to make these sorts of things happen, or at least dramatically increase the likelihood.

            • having access to source code that purports to be what's running on the device doesn't get you there.

              hence the superiority of the gentoo/lfs/etc approach :) but building Android is a serious nightmare... even if they wanted to give you the code.

              One idea I've been toying with is a framework-level network tap that allows you to divert a copy of every bit that your phone sends or receives, via network, Wifi, bluetooth, NFC or USB, for your perusal and examination.

              That seems like a fairly obvious thing to do; if it's in the kernel, then a user can reasonably work out whether it does what it's supposed to. Aren't there some facilities in the Linux kernel which could trivially be used to provide that functionality?

              Of course, there's a big downside: if this single data collection point exists, it will be a tremendously attractive target for compromise by other parties who want to see what your device sends or receives.

              There's always a down side. I perceive untampered Android security as pretty good, though. As long as you need root

              • having access to source code that purports to be what's running on the device doesn't get you there.

                hence the superiority of the gentoo/lfs/etc approach :) but building Android is a serious nightmare... even if they wanted to give you the code.

                No kidding. There's a reason my workstation has 40 cores and 128 GiB RAM.

                I perceive untampered Android security as pretty good, though.

                I do, too, actually. Far better than I thought it would be. It's refreshing to hear someone outside of Google say that, though :-)

                As long as you need root elevation, it seems like the kind of thing that you can keep users from shooting themselves with accidentally. What more can you hope for?

                Well, the current direction is to create a lot of firewalls between components that even root can't breach, using SELinux. This is obviously to reduce the impact of privilege escalation exploits, and even more important to eliminated many of them because many exploits today are actually exploit chains, so if

                • I may be unduly pessimistic about the dangers of such a "central I/O tap", because I haven't had time to look at it hard. I will, though.

                  So, how do you keep applications from knowing that the tap is in use? :)

                  • I may be unduly pessimistic about the dangers of such a "central I/O tap", because I haven't had time to look at it hard. I will, though.

                    So, how do you keep applications from knowing that the tap is in use? :)

                    That would be the easy part. There'd just be no way for them to tell.

            • One idea I've been toying with is a framework-level network tap that allows you to divert a copy of every bit that your phone sends or receives, via network, Wifi, bluetooth, NFC or USB, for your perusal and examination. Since most apps use the framework APIs for SSL, it should be possible to snarf this data before it's encrypted, too.

              Good luck. I captured all the traffic that a nexus 7 sends during initial setup, and it was immense. Numerous hosts, protocols, you name it. A few hundred megabytes total. Very hard to make heads or tails of (especially given the encrypted content).

              • One idea I've been toying with is a framework-level network tap that allows you to divert a copy of every bit that your phone sends or receives, via network, Wifi, bluetooth, NFC or USB, for your perusal and examination. Since most apps use the framework APIs for SSL, it should be possible to snarf this data before it's encrypted, too.

                Good luck. I captured all the traffic that a nexus 7 sends during initial setup, and it was immense. Numerous hosts, protocols, you name it. A few hundred megabytes total. Very hard to make heads or tails of (especially given the encrypted content).

                It couldn't be that bad, or people on mobile networks would burn most of their month's data setting up a new device.

                And the idea would be to get as much as possible out before it's encrypted. It would still be tough to analyze, but people would figure it out.

                • It couldn't be that bad, or people on mobile networks would burn most of their month's data setting up a new device.

                  And if that data is flagged in such fashion as to not count against one's data cap?

                  • It couldn't be that bad, or people on mobile networks would burn most of their month's data setting up a new device.

                    And if that data is flagged in such fashion as to not count against one's data cap?

                    Android doesn't send any particular different parameters during setup. There's really no way the carrier could even know the difference. And if the device could send something that meant "hey, doing setup, don't charge this" you know custom ROMs would arrange to send that *all* the time, or at least as often as they can get away with.

                • It couldn't be that bad, or people on mobile networks would burn most of their month's data setting up a new device.

                  I don't know under what conditions Android will decide to install some subset of your installed apps to a new install; is it just when it thinks it's the old device? Sometimes when I reload my phone with another OS (I run SOKP on my Moto G 2014 (titan) and just did a clean flash of the latest) the play store wants to reinstall all my apps, sometimes it doesn't. I use Ti Backup so that it doesn't have to, and sometimes I have had to interrupt it trying to be helpful. That could easily come to hundreds of meg

                  • I'm not sure about older versions (I just don't remember) but with L it asks you if you want to sync your apps.
      • by jtgd ( 807477 )

        best just to remove the app (if you can)

        I just got a tablet running Lollipop and in fact you cannot remove Chrome (without rooting).

  • by Anonymous Coward on Friday June 19, 2015 @09:14AM (#49944349)

    That is one reason my desktop doesn't have a mic, nor a camera. If it isn't there, then software can't abuse it.

    Even with laptops, back in the early 2000s, I remember a brand that had an analog switch. Flip the switch, no mic, no way for software to access the mic.

    We need that functionality back in hardware, just because it should be assumed that software will abuse it.

    • No, this is why we use open source, so that things like this doesn't happen. Chromium is just not that opensource friendly.

      • Open Source software is not guaranteed to not have backdoors. Just because something is opensource doesn't mean it is safe or that someone (beside the original author) ever looked at it.

        But while it is easier to spot backdoors in OSS than in closed source products it is also easier, for a trained eye, to spot defects and vulnerabilities that can be used for malicious purposes.

        For this reason I second every hardware device that can limit the software from spying on me. A physical switch can seem old fashione

  • by meta-monkey ( 321000 ) on Friday June 19, 2015 @09:24AM (#49944429) Journal

    No. I do not like change. Put the comment link back below the summary.

    Do it.

    Do it now.

    Do it.

    Do.

    It.

    • by Anonymous Coward

      And what's with this "Share" button being so prominent now? Does anyone actually want to share things on Slashdot?

      • by bulled ( 956533 ) on Friday June 19, 2015 @09:44AM (#49944621)
        Does the average /.er have anyone to share something with?
        • Assuming we did want to share /. stories with someone, we only paste URLs into our chat clients, never "share" them on "social media" platforms.

          I paste /. URLs into Jabber and IRC chats all the time.

        • by Anonymous Coward on Friday June 19, 2015 @12:53PM (#49946427)

          That's not the worst part. They don't just not know the audience, they don't know how this site is used, or why it's any good.

          Nobody is going to share the /. summary of a linked article. The summary is crap most of the time, the good part about /. is the discussion it generates, not the summary itself. You'll either share the linked article (so nothing related to /.) or the article page with the comments after you read the comments.

          Put a big-ass share button button on the bottom of the comment page and you'll get more shares and might get more readers after they see the comments. As it is right now nobody will use the share button and newcomers to the site won't even realize there are comments worth reading and will dismiss it as a crappier commentless reddit clone.

    • And can you change the dropdowns back so they're not black-on-dark-green?
    • But the new design saves so much screen real estate!

      Oh, wait. Because of that stupid "share" button sitting all by itself that nobody is going to use, you haven't saved any space at all.

      Isn't one of the tenets of good website design that it's better make the links obvious so that people can find them? Old users are annoyed by the change because it breaks their expectations. New users are much less likely to find the comment section of Slashdot because there's no clearly-marked link to get to them -- you

    • by virens ( 1964322 )
      They will not put the comments link back. You don't get it: these are corporate slime. All that corporate slime and businesschmucks can do is "be like everybody else". They don't have a face - they are just suits, which is just the same for everybody else. When Cmdr Taco was at the steering wheel, this was Slashdot. When the corporate slime from Dice took over, I don't even want to click on 90% of stories. This is why MBA must be abolished. But alas - migrate to https://soylentnews.org/ [soylentnews.org]
  • At Google’s product forums users of Chrome have expressed concern about the lack of any API access to disable the audio recording capability,

    The problem isn't so much that Chromium is doing that, it is that most packages run largely unprotected.

    What Linux lacks is something similar to what the Android / iOS permission systems attempt to do (but aren't very good at either). All the low level infrastructure is there, but there is support missing at the package and desktop level.

  • Who are these people? How did they get in control? Should users migrate elsewhere?
  • The key point I made in my official response [google.com] was overlooked by this article: the hotword module does not run at all unless you opt in, by going to Chromium's settings and turning on the "Ok Google" feature.

    Once you turn it on, it's true that we don't send recordings to Google unless the hotword detector hears "Ok Google", but without explicit opt-in, this module is not listening. It is not even running.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...