Hackers manage to software activate the iSight of a Mac without a green indicator light

ISIGHT

A few days ago a controversial issue related to cameras has been circulating on the network iSight of our Macs in all its versions.

The fact is that it seems that hackers have managed to bypass the control protocol and reprogram the microcontroller to be able to spy through them without the user noticing.

After digging into the subject a bit, we have been able to know that the cameras in Mac computers are always accompanied, as we all know, by a small green LED as a safety feature. So far everything is normal, but the fact is that so that it cannot be the case that the camera is turned on without the LED being, and therefore the privacy protection effect offered by the LED does not exist, it is mounted on the same power cord as the camera. In this way, only when the camera is connected, the green LED will be on.

Some students from the Johns Hopkins University They have discovered that this can be modified by reprogramming the microcontroller. The fact is that the power on of the LED is controlled by software designed for it, which can be modified to be able to alter its operation and therefore that of the LED.

The alarms have gone off and Apple, we are sure, will already be at work making that situation, if it is true that it exists, be blocked as soon as possible.

If you do not trust your webcam at all, the infallible method is the piece of opaque electrical tape, of course, until a solution is found, because it is not logical to break the aesthetics of your Mac with these botches.

More information - Apple TV could look like Cinema Display with iSight and Siri


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.