It was recently revealed that the open source basis for Chrome, the Chromium browser, remotely installs audio-snooping code that can listen to users.

The code in question was designed to support “OK, Google” hotword detection. However, it was installed and activated on some computers without users’ permission. It should be noted that the feature is installed by default as part of Google’s Chrome browser, while open source developers are also up in arms about it also being installed with Chromium.

The company responded to eavesdropping complaints via its developer boards, saying that the hotword module is indeed downloaded automatically on startup, but is not activated unless the user opts in to hotwording.

In addition, Google blamed the Linux distribution Debian for downloading the non-open source component with Chromium, saying that Chromium is not a Google product and the company can’t make any guarantees with respect to compliance with various open source policies. In response, some developers argued that default install of the code would still wiretap the room without user’s consent. Apparently, the only way to avoid spying is to build a hardware switch to disable the microphone and camera into computers.

Today, voice search functions like Siri or “OK, Google” have become an accepted feature of modern smartphones, though they caused concerns over the possibility of being eavesdropped. Despite the fact that such services normally require a user to opt in, the concerns are that their use, which includes sending voice recordings over the Internet for processing, risks exposing private conversations.