(Replying to PARENT post)
https://thehackernews.com/2017/10/uber-screen-record-iphone....
(Replying to PARENT post)
The tricky bit is when users give microphone access to the app (i.e. for video recording functionality), but want to verify it's only being used then.
(Replying to PARENT post)
(Replying to PARENT post)
On the other hand, facebook can check (at least on IOS) easily if the device is jailbroken and behave differently.
You can also patch binary and inject some code, (probably swizzle AVAudioRecorder methods) for the same effect.
In this case, Facebook can check binary integrity, and change behavior accordingly.
So this is kind a cat and mouse game.
(Replying to PARENT post)
Disclaimer: I don't really know a) if there is some other way to interface with the mic or b) what I'm talking about in general.
(Replying to PARENT post)
In the other hand that is a considerable effort for someone who does not usually work with this part of the stack... would you be able to introduce this changes in an android OS?
(Replying to PARENT post)
I am not network guy so just asking and seeking for valid explanation.
(Replying to PARENT post)
So, I did this sort of thing years ago when I wrote a tweak for the InPulse smartwatch (later became Pebble) https://github.com/brandontreb/inPulseNotifier .I was able to hook into the system messaging, forward it to a custom bluetooth stack (sending it to the watch) and forward the message up the stack to be displayed by the system.
It would stand to reason that the same sort of process would be effective for catching Facebook invoking audio recording. Once you hook into the AVAudioRecorder's interface, you could theoretically observe the following:
1. Open the Audio Recorder app and hit Record - An alert should show to prove your tweak is working.
2. Open the Facebook app. If you receive a similar alert at some point, you could at least prove that FB is invoking the audio recorder at some point without the user's expressed permission.
Am I crazy or could this test actually work?