Gaming mouse can eavesdrop on conversations — research reveals unexpected vulnerabilities

By: Viktor Tsyrfa | 06.10.2025, 18:18
What has changed for artificial intelligence in 2023? Illustrative image. Source: ШІ

Researchers from the University of California, Irvine (UCI) found that high-precision optical computer mice, including gaming models with a resolution of 20,000 dpi and a high polling rate, can be used to eavesdrop on conversations. This technology, described in the study titled Mic-E-Mouse, converts microscopic vibrations of a table surface caused by voice into acoustic signals that can be reconstructed into speech.

The eavesdropping process involves capturing raw data packets of mouse movement, isolating vibrations related to speech, and processing them through digital signal processing. In particular, a Wiener filter is used to remove noise and isolate speech frequencies, after which a neural network reconstructs the sound wave. In tests, the accuracy of speech recognition ranged from 42% to 61%, making the conversations partially intelligible. This eavesdropping method is not very precise, but it is very easy to implement and does not require complex malware: any malicious program that receives data from a quality mouse can be used for information leakage. Data can be transmitted to a remote server and analyzed. Currently, no operating systems — Windows, MacOS, or Linux — provide special control over data from mice, unlike keyboards, whose access from background programs can be perceived as keylogging.

This finding highlights serious privacy risks in the era of ubiquitous sensors. Ordinary devices like gaming mice become unexpected vulnerabilities, especially in combination with generative AI and accessible high-tech equipment. The study shows how everyday gadgets can turn into spying tools without the user's knowledge. It only takes a creative approach to the task at hand.

Currently, Mic-E-Mouse is merely a research project that requires specific conditions and a compromised system. At least there are no known hacker attacks exploiting this vulnerability. The authors call for broader discussion of acoustic privacy risks, but no specific protection recommendations (e.g., limiting access to mouse data) are provided in the article.

Source: www.techspot.com