Hacking What You See With Google Glass
After apparently rooting Google Glass last week, researcher Jay Freeman now says he's found something scarier.
According to Forbes.com "Freeman notes that the “Explorer” version of Glass, which he obtained through a developer program, doesn’t have any sort of PIN code or other authentication. So any time it’s turned on and left unattended an attacker could attach a USB cable to the headset and immediately gain full “root” access to install a surveillance program that could upload a user’s images, video, or audio to a remote server.
“Once the attacker has root on your Glass, they have much more power than if they had access to your phone or even your computer: They have control over a camera and a microphone that are attached to your head,” writes Freeman. “A bugged Glass doesn’t just watch your every move: it watches everything you are looking at (intentionally or furtively) and hears everything you do. The only thing it doesn’t know are your thoughts.”
Again, it's unclear whether the above attack will work on the final consumer version of Glass; Freeman is using a special developer's version.