• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

How to remove/destroy mic on Samsung Galaxy Tab A?

yes it does because you don't have a frigging clue

heres the deal if somebody e.g a gov agency wants to spy on you that using the mic in your tablet is the last thing they will do

they will simply issue a NSL to your isp and own your entire network and then they will bug your house OR park a unmarked vehicle down the block with a surveillance setup or they could just knock on your door and say get in the van or get blown away because the reality is THEY make the rules and for all your fuss and crying there is very little you can do to resist if you piss off the wrong people

if you are that tin-foil headed then the last thing you should own is a computer or internet connected device
30 seconds on google gave me your user name your flickr/reddit email and steam profile and every single public post you have made on the internet dating back to 2010

if I can find that just by typing your user name in google wanna bet what somebody with warrant can find


Can't say any better than this.

This is why I love cats. So smart and with our furry paws typing on keyboard and searching. :D
 
I recommend he move to a log cabin in Alaska and burn oil for light and wood for heat
 
I recommend he move to a log cabin in Alaska and burn oil for light and wood for heat

The safest place for OP might be North Korea. No internet connection with the outside world. :D

While we are way off the topic I am gonna drop this here as well

 
yes it does because you don't have a frigging clue

heres the deal if somebody e.g a gov agency wants to spy on you that using the mic in your tablet is the last thing they will do

they will simply issue a NSL to your isp and own your entire network and then they will bug your house OR park a unmarked vehicle down the block with a surveillance setup or they could just knock on your door and say get in the van or get blown away because the reality is THEY make the rules and for all your fuss and crying there is very little you can do to resist if you piss off the wrong people

if you are that tin-foil headed then the last thing you should own is a computer or internet connected device
30 seconds on google gave me your user name your flickr/reddit email and steam profile and every single public post you have made on the internet dating back to 2010

if I can find that just by typing your user name in google wanna bet what somebody with warrant can find

Pot meet kettle. That takes effort and authorization and data collection begins at that point, which is the complete opposite passively collect everything they can get their hands on and have a look-see whenever they get around to it/feel like. He doesn't have problem with them collecting his info if they need but collecting his info when they have no business doing so.
 
Pot meet kettle. That takes effort and authorization and data collection begins at that point, which is the complete opposite passively collect everything they can get their hands on and have a look-see whenever they get around to it/feel like. He doesn't have problem with them collecting his info if they need but collecting his info when they have no business doing so.
because clearly smashing the mic on your tablet is effective
don't be dense

nobody has any interest in listening to you jerk it to furry porn

this entire thread is idiotic and product of people watching to much csi/NCIS and not enough actual knowledge

tapping a devices audio input is not something you do passively or even something that would be feasible without the users interaction

todo that you would need to deploy some kind of malware or virus gain enough system privilege to access the mic and then HOPE the tablet was in a location that provided something useful the range on the mics on those is less then 5 foot even at maximum gain AND the mic is directional so it would need to be facing who ever you wanted to record to have a shot
 
Last edited:
because clearly smashing the mic on your tablet is effective
don't be dense

nobody has any interest in listening to you jerk it to furry porn

this entire thread is idiotic and product of people watching to much csi/NCIS and not enough actual knowledge

tapping a devices audio input is not something you do passively or even something that would be feasible without the users interaction

todo that you would need to deploy some kind of malware or virus gain enough system privilege to access the mic and then HOPE the tablet was in a location that provided something useful the range on the mics on those is less then 5 foot even at maximum gain AND the mic is directional so it would need to be facing who ever you wanted to record to have a shot
lol....tell that to the CEO at the company I work for and tell it to the other CEO's that he has confidential meetings with.... especially that 5 foot range thingy you mentioned.........Maybe the csi crapola desensitized your understanding of the topic.
 
lol....tell that to the CEO at the company I work for and tell it to the other CEO's that he has confidential meetings with.... especially that 5 foot range thingy you mentioned.........Maybe the csi crapola desensitized your understanding of the topic.
no I think you just have very little understanding about how people accually go about `hacking` or surveillance
try reading a couple books or watching some of the old defcon conference replys on youtube
but if you are tldr here is the short ver again:

nobody wants to bother using the mic on your crappy garbage tier tablet to spy on you they much rather bug the room or pay somebody to wear a wire or use any on of a dozen ready made surveillance mics you can get online and sit a building away

again you belive what you hear on the news or the internet and have really no clue about how deep this particular rabbit hole goes if you have information of value that somebody wants THEY ARE GOING TO GET IT period end of discussion unless you wanna have your meetings spoken in code in a faraday cage

this entire thread is nothing but a ill informed user with a tin foil hat and with no reason or real concerns about security because if he did he would have practiced basic OpSec and not used the same frigging user name everyware
 
there is nothing mystical about 'hacking' its not magic its not some super secret skunk works ninja hax0rs that operate out of a hidden facility deep in the Colorado mountains\

its CODE,the fundemental fuctions writen by humans its readily understandable if you take the time once you understand it the boogieman is easily slain
 
and btw plugging in a headset mic won't help you the function that switches between is controlled by the os one terminal command and you can switch it back
smashing the mic won't do you a dam bit a good either ,once somebody figures out they can't get output from it they will move to plan B which is bug the room or beat you with the 5 dollar wrench untill you tell then what they want to know
or lets list the other things in the room that can be put to use
your phone
somebody elses phone
a plain old landline
ANY computer
lights (yes lights)
the glass in the windows
somebody with a glass on the otherside of the door
 
i mean, it could be an unrelated malware or spam or other non state, if the feature isnt used, why not turn it off? does it have to be so binary have everything or live in a cave?
 
i mean, it could be an unrelated malware or spam or other non state, if the feature isnt used, why not turn it off? does it have to be so binary have everything or live in a cave?
hes talking about stabing it with a knife or ripping it out
not disabling it ...
 
hes talking about stabing it with a knife or ripping it out
not disabling it ...
yes, permanently disabling it, what's the difference, not like he can do it in software on a locked down rom

not installing a wifi driver is a similar concept to removing the antenna or unplugging the module

i was speaking more generally, why have homegroup or samba or whatever enabled if you dont use it? people talk about removing bloatware from prebuilts, well every OS has bloatware that you dont use either, why wouldnt you disable to increase boot time, reduce cpu load, reduce power, reduce bugs, reduce malware entry points, the list goes on

i'm sure tons of people got kicked out of their game when they crouched several times, triggering sticky keys to pop up, something they do not need or want
 
Back
Top