Your headphones may be following you: How a Google Fast Pair exploit lets hackers spy in seconds


  • Attackers can hack your speaker microphones and track your location
  • The vulnerability is found in Google’s Fast Pair feature
  • Researchers say flaw could affect millions of devices

Google’s Fast Pair feature is intended to allow you to connect your headphones and speakers to your Android or ChromeOS device with just one click. Yet it now appears that the price of this convenience is a security hole that could leave millions of devices open to hackers and eavesdroppers.

This surprising discovery was made by security researchers at the Computer Security and Industrial Cryptography group at KU Leuven University in Belgium (via Wired), who dub the vulnerability collection WhisperPair.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top