{"id":60118,"date":"2015-06-29T12:00:31","date_gmt":"2015-06-29T11:00:31","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=60118"},"modified":"2015-06-23T17:08:33","modified_gmt":"2015-06-23T16:08:33","slug":"google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/06\/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth\/","title":{"rendered":"Google Chrome Listening in to Your Room Shows the Importance of Privacy Defense in Depth"},"content":{"rendered":"<p>18 Jun 2015 &#8211;<em> Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to \u201cwe can do that\u201d.<\/em><\/p>\n<p>It looked like just another <a target=\"_blank\" href=\"https:\/\/bugs.debian.org\/cgi-bin\/bugreport.cgi?bug=786909\" >bug report<\/a>. &#8220;When I start Chromium, it downloads something.&#8221; Followed by strange status information that notably included the lines &#8220;Microphone: Yes&#8221; and &#8220;Audio Capture Allowed: Yes&#8221;.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/06\/chrome-voicesearch-300x200-privacy-spying-surveillance-google.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-60119\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/06\/chrome-voicesearch-300x200-privacy-spying-surveillance-google.png\" alt=\"Without consent, Google\u2019s code had downloaded a black box of code that \u2013 according to itself \u2013 had turned on the microphone and was actively listening to your room.\" width=\"600\" height=\"400\" \/><\/a>Without consent, Google\u2019s code had downloaded a black box of code that \u2013 according to itself \u2013 had turned on the microphone and was actively listening to your room.<\/p>\n<p>A brief explanation of the Open-source \/ Free-software philosophy is needed here. When you\u2019re installing a version of GNU\/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine <em>actually<\/em> does instead of trusting corporate statements on what it\u2019s <em>supposed<\/em> to be doing. Therefore, you don\u2019t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called \u201cupstreams\u201d of source code to build the final product.<\/p>\n<p>Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that <em>bypassed<\/em> this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don\u2019t know and can\u2019t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.<\/p>\n<p>This was supposedly to enable the \u201cOk, Google\u201d behavior \u2013 that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.<\/p>\n<p>Obviously, your own computer isn\u2019t the one to analyze the actual search command. Google\u2019s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by\u2026 an unknown and unverifiable set of conditions.<\/p>\n<p>Google had two responses to this. <a target=\"_blank\" href=\"https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=491435#c4\" >The first<\/a> was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you <em>need<\/em> to opt out, which is nowhere a reasonable requirement. But <a target=\"_blank\" href=\"https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=500922#c6\" >the second<\/a> was more of an official statement following technical discussions on Hacker News and other places. That <a target=\"_blank\" href=\"https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=500922#c6\" >official statement<\/a> amounted to three parts (paraphrased, of course):<\/p>\n<ul>\n<li>Yes, we\u2019re downloading and installing a wiretapping black-box to your computer. But we\u2019re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that <em>activates<\/em> the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn\u2019t do this right now.<\/li>\n<li>Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people\u2019s computers. But that\u2019s not something we care about, really. We\u2019re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome\u2019s behavior, this is Debian Chromium\u2019s behavior. It\u2019s Debian\u2019s responsibility entirely.<\/li>\n<li>Yes, we deliberately hid this listening module from the users, but that\u2019s because we consider this behavior to be part of the basic Google Chrome experience. We don\u2019t want to show all modules that we install ourselves.<\/li>\n<\/ul>\n<p>If you think this is an excusable and responsible statement, raise your hand now.<\/p>\n<p>Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don\u2019t even get a theoretical choice. You\u2019re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.<\/p>\n<p>This episode highlights the need for hard, not soft, switches to all devices \u2013 webcams, microphones \u2013 that can be used for surveillance. A software on\/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on\/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That\u2019s how you defend against this in depth.<\/p>\n<p>Of course, people were quick to downplay the alarm. \u201cIt only listens when you say \u2018Ok, Google\u2019.\u201d (Ok, so how does it know to start listening just before I\u2019m about to say \u2018Ok, Google?\u2019) \u201cIt\u2019s no big deal.\u201d (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords \u2013 and it\u2019s no big deal!?) \u201cYou can opt out. It\u2019s in the Terms of Service.\u201d (No. Just no. This is not something that is the slightest amount of permissible just because it\u2019s hidden in legalese.) \u201cIt\u2019s opt-in. It won\u2019t really listen unless you check that box.\u201d (Perhaps. We don\u2019t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )<\/p>\n<p>Early last decade, privacy activists practically yelled and screamed that the NSA\u2019s taps of various points of the Internet and telecom networks had the <em>technical<\/em> potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery \u2013 until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.<\/p>\n<p>Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of \u201ctrust us\u201d.<\/p>\n<p>Privacy remains your own responsibility.<\/p>\n<p>_________________________________<\/p>\n<p><em>Rick Falkvinge is the founder of the first Pirate Party and is a political evangelist, traveling around Europe and the world to talk and write about ideas of a sensible information policy. He has a tech entrepreneur background. Read more of his articles on <a target=\"_blank\" href=\"https:\/\/falkvinge.net\" >his website<\/a>.<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.privateinternetaccess.com\/blog\/2015\/06\/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth\/\" >Go to Original \u2013 privateinternetaccess.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nobody is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of \u201ctrust us\u201d.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-60118","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/60118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=60118"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/60118\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=60118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=60118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=60118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}