How high-end gaming mice can eavesdrop on your speech

Danny Weber

17:32 06-10-2025

© A. Krivonosov

Researchers show high-end gaming mice can capture speech via motion sensors, enabling covert eavesdropping without microphone access. Risks, accuracy, and tips.

Researchers have uncovered an unexpected vulnerability: modern high-end gaming mice can pick up minute vibrations caused by human speech and, with the right processing, turn into tools for acoustic eavesdropping. In lab experiments, reconstructing spoken language from mouse motion sensor data reached 42% to 61% recognition accuracy, a level that already allows key information to be pulled from conversations.

The crux of the issue

The risk stems from the extreme sensitivity of certain optical sensors. Models with resolutions in the tens of thousands of DPI and high polling rates register even microscopic shifts of the desktop surface. In gaming and professional workflows that sensitivity helps with precision, but in the wrong hands it becomes a channel for acoustic data leakage. It is a stark reminder that performance features can have a hidden flip side.

The team describes the attack as covert. Malicious code embedded in an application gathers the mouse’s high-rate motion data packets, the same ones games and specialized software use for accurate tracking, and sends them to a server. There, the raw stream is processed and matched against models to reconstruct fragments of speech. The authors note that while accuracy is still far from ideal, it is sufficient to pick out names, numbers, addresses, and other sensitive details.

What makes this especially troubling is that the attack does not require explicit microphone access. It is enough for a user to grant an app permission to read high-frequency mouse telemetry, a capability commonly requested by games and niche tools. That makes detection harder and argues for closer scrutiny of app permissions and software sources before granting access.

Experts advise exercising caution with software from unverified sources, regularly reviewing application permissions, using a reputable antivirus, and limiting third-party access to data from peripheral devices.

In the end, the researchers say the finding underscores the unintended consequences of ever-rising sensitivity in consumer electronics: features designed for convenience and accuracy can be repurposed for data theft. Hardware makers, software vendors, and regulators now have to weigh the risks and introduce safeguards so that sensitive yet invisible signals do not turn into a privacy liability.