• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Google Eavesdropping Software

September 29, 2006

Views: 9,245

[ad]

This is a little scary, intensely personal ads which to be frank are getting a little invasive as it is..It’s like the part in minority report where the billboards scan your eyes and talk to you using your name and history of purchases.

It looks like it might be happening sooner than we think.

The first thing that came out of our mouths when we heard that Google is working on a system that listens to what’s on your TV playing in the background, and then serves you relevant adverts, was “that’s cool, but dangerous”.

The idea appeared in Technology Review citing Peter Norvig, director of research at Google, who says these ideas will show up eventually in real Google products – sooner rather than later.

The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject.

Being a hacker at heart..I don’t trust ANYONE or ANYTHING when they say it’s secure, it can’t be broken, it’ll be kept away from prying eyes, as well…we all know whatever can be made can be broken one way or another right?

Pretty soon the security industry is going to find a way to hijack the Google feed and use it for full on espionage.

Google says that its fingerprinting technology makes it impossible for the company (or anyone else) to eavesdrop on other sounds in the room, such as personal conversations, because the conversion to a fingerprint is made on the PC, and a fingerprint can’t be reversed, as it’s only an identity.

But we should think that “spyware” might take on an extra meaning if someone less scrupulous decided on a similar piece of software.

Anyone else thinking “Yah right?”.

Source: The Register

Related Posts:

  • mcp-scan - Real-Time Guardrail Monitoring and…
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • An Introduction To Web Application Security Systems
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Post-Quantum Cryptography in 2025 - Migration Paths,…
  • US Voting Machines Hacked At DEF CON - Every One
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Privacy Tagged With: big-brother, google, google-hacking, Privacy, snooping, spying, spyware



Reader Interactions

Comments

  1. John says

    September 29, 2006 at 3:12 pm

    Your right, its absurd.

  2. Jordan says

    September 29, 2006 at 4:29 pm

    The question is, will it enable a disabled mic? Also, what plugin is required to actually do it. Conceptually I can see why they want to do it, I do think its misguided however. It will be easy enough to stop though. Just disable or mute your mic when not in use. If they go so far to enable and unmute the mic I think they will have a different type of battle on their hands.

  3. Stevo says

    September 29, 2006 at 4:29 pm

    That software will never touch a single machine under my command. EVER!!!!!!!!

    When will people learn to not trust these types of movements.

    We have lost enough free will already, all we have left is the net, fight for it…….

  4. Ritec says

    September 29, 2006 at 4:50 pm

    This sounds a little far fetched but it definetly does not surprise me. Google needs to keep inventing and reinventing new ways of serving ads, its major source of income, in order to keep those $400.00 a share stocks from going down. Google will reach a point where “don’t be evil, their motto, just won’t work anymore.

    Let’s see what the future brings, but it looks dark froim this angle.

  5. hobot says

    October 2, 2006 at 1:45 pm

    While software might be able to enable the mic under an OS, it will not be able to use my cut-out switch for a long, long time.

  6. SicKn3sS says

    October 9, 2006 at 9:37 pm

    That’s why my microphone has a mute button :D

  7. iskorpitx says

    October 10, 2006 at 10:44 am

    Mic is ok but do you have a mute button?

  8. Franco says

    October 27, 2006 at 11:21 am

    I cannot believe that anyone would allow the intercept of their private audio within their home. You would have to be the number one canidate for a village idiot job.

    With this surveillance technology, your TV, videos, conversations, and intimate sounds will be available for the whole world to hear. I can see the websites popping up to play audio selections according to topic…sex, drugs and politics!

    Google….the Hackers are drooling in anticipation of your software being made available to them. You can’t be serious if you think it can’t be cracked. The Hackers of the world should target Google Execs first. Maybe then they will wake up and smell what they are trying to sell us.

  9. Vakin VonSnizzSnakker says

    December 16, 2006 at 12:36 am

    This might sound far-fetched and, understandably, many of you are dubious of this spying via microphone but I am certain it is already happening. I, more than once, have gotten junk email (gmail) or an ad in gmail that contained a name or other noun word that I had recently SPOKEN within near proxcimity of my PC. I would dismiss it as co-incidence or assume that I, or someone corressponding with me, had actually included the word in an email and if I went back and searched I’d find that key or target word. I mean, surely, google is not eavesdropping on spoken conversations that transpired in my home…Then I read about their technology to just that very thing (well TV audio, suppossedly not people’s conversation) and I now know that that very thing had happened. One friend of mine had, on his own, said he noticed the same occurence of things he had spoken turning up in a target ad. So that’s two people who noticed this prior to the technology being discussed by google themselves. And this is another really creepy thing. I have, for certain, had target spam/junk emails contain terms or words lifted from text messages on my cell phone. For sure for real. This is such a major invasion of privacy it is almost overwhelming. To arms? To the presses? Or to the pc with it’s convienience and technology to just roll over and give up, give in, take it in the backside and comply like sheep and bury our heads in the sand like an ostrich?

  10. Ishkur says

    December 20, 2006 at 2:12 am

    hmmmm, that wouldnt really affect me that much for a while. My current comp doesnt have a mic.

  11. msk says

    December 21, 2006 at 2:33 am

    “The first thing that came out of our mouths when we heard that Google is working on a system that listens to what’s on your TV playing in the background, and then serves you relevant adverts, was “that’s cool, but dangerous”.”

    Thats not cool at all, thats just f***ed up. I am suprised they would even be talking about doing something that is so invasive. The fact that they are apparently seriously considering this makes me wonder what else they are planning on.

    in response to Vakin VonSnizzSnakker somebody should do a test and see if that is true.

  12. IntrusiveGod says

    April 18, 2008 at 6:51 am

    It’s ok, there’s probably a portion there for privacy settings or customization of both end users. When will they release it for public?

  13. zupakomputer says

    April 18, 2008 at 4:14 pm

    Spoken? They (in general) do that with your thoughts already. It’s called fake-synchronicity-manufacturing.

    And the saddest part is that they actually think they are serving you and you somehow want that in your life. Er no I don’t, I want things to go back to how they were a bit more, like when jobs existed and I had the money to buy those products you think I want that I’m not actually interested in. Back when the universe did serve me up a lot more of what I had in fact ‘ordered’, mainly because you weren’t there getting in the way with that psi-spying.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,298

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,141

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,410

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,326

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,243

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,120

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,275)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,565)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,363)
  • Password List Download Best Word List – Most Common Passwords (934,682)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,407)
  • Hack Tools/Exploits (674,321)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,447)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy