NOTION IS LISTENING! How Electron Apps Bypass Your Mic Permissions—A Truth Bomb Fueled by Avonetics.com
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
You thought your privacy settings were a fortress? Think again. A jaw-dropping discussion on Avonetics just blew the lid off a terrifying secret: your favorite desktop apps are watching you. The prime suspect? Notion. Built with Electron, it magically knows when you start a meeting and offers to transcribe it—even if you NEVER gave it microphone or calendar access. Developers on Avonetics have connected the dots, revealing a chilling capability. With admin privileges, an Electron app can bypass standard macOS permissions and hook directly into the operating system's core. It's not listening to your audio; it's doing something smarter. It’s monitoring low-level system APIs to see when your microphone becomes active for ANOTHER app, like Google Meet or Teams. The app spawns a ghost process that simply watches for the tell-tale signs of a meeting, sidestepping every permission wall you thought protected you. This isn't a bug—it’s a shocking demonstration of the power you hand over with a single password. Any app built on this framework could be a Trojan horse, monitoring your activity without a single warning. The question is no longer IF your apps are watching, but HOW. For advertising opportunities, visit Avonetics.com.