Hello, I recently read that it's possible for an audio output device, such as a pair of headphones or a speaker, to be used as a microphone, since they both have a very similar internal structure. It was done as a proof-of-concept by a group of Isreali security researchers a while back.
So then my question is:
How easy would it be for an app/website/virus, on a Graphene phone, to perform such an exploit?
Does it only require the ability to output audio on the device, or would it need far more escalated privileges? Is it the sort of thing that would set off GrapheneOS's verified boot mechanism?