{"id":216110,"date":"2025-06-17T06:20:02","date_gmt":"2025-06-17T11:20:02","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/06\/hackers-could-use-smartwatches-to-eavesdrop-on-air-gapped-computers-via-ultrasonic-signals"},"modified":"2025-06-17T06:20:02","modified_gmt":"2025-06-17T11:20:02","slug":"hackers-could-use-smartwatches-to-eavesdrop-on-air-gapped-computers-via-ultrasonic-signals","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/06\/hackers-could-use-smartwatches-to-eavesdrop-on-air-gapped-computers-via-ultrasonic-signals","title":{"rendered":"Hackers could use smartwatches to eavesdrop on air-gapped computers via ultrasonic signals"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/hackers-could-use-smartwatches-to-eavesdrop-on-air-gapped-computers-via-ultrasonic-signals2.jpg\"><\/a><\/p>\n<p>A security specialist at Ben-Gurion University of the Negev has found evidence that it might be possible to infiltrate an air-gap computing system using a smartwatch. Mordechai Guri has published a <a href=\"https:\/\/arxiv.org\/abs\/2506.08866\" target=\"_blank\">paper<\/a> outlining his ideas on the <i>arXiv<\/i> preprint server.<\/p>\n<p>Air-gap computers or computing systems are those that have been physically removed from other networks, such as the internet, as a way to make them remotely hack-proof. The only way such a computer or system could be hacked would be to gain direct <a href=\"https:\/\/techxplore.com\/tags\/physical+access\/\" rel=\"tag\" class=\"\">physical access<\/a> or to have someone do it for them. In his paper, Guri suggests there may be another way\u2014by using features of smartwatches.<\/p>\n<p>Smartwatches, Guri notes, have all the features needed to listen for ultrasonic signals from an air-gapped computer, starting with a microphone. They also could be used for processing signals or for routing them to a speaker or a Wi-Fi device, which could broadcast them to a more sophisticated device.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security specialist at Ben-Gurion University of the Negev has found evidence that it might be possible to infiltrate an air-gap computing system using a smartwatch. Mordechai Guri has published a paper outlining his ideas on the arXiv preprint server. Air-gap computers or computing systems are those that have been physically removed from other networks, [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-216110","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/216110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=216110"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/216110\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=216110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=216110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=216110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}