A few weeks ago, I ran a simple experiment: I let Maclaw run for 72 hours logging every microphone access on my Mac. I had closed all tabs, finished my meetings, and wasn't using any voice assistant.

Result: 23 microphone access events recorded over 3 days. Some lasted a few milliseconds, others several minutes. All happened without me doing anything in particular.

Here's what I found, app by app.

The 5 app categories to watch

1
Slack
Frequent

Slack regularly accesses the microphone even when you're not in any Huddle. The official reason: audio availability detection for Huddles and managing the mute button. In practice, Slack opens a brief audio session to verify your mic works, even when the app is simply running in the background.

Fix: System Settings → Privacy & Security → Microphone → uncheck Slack. Slack will ask for access only when you join a Huddle.
2
Web Browsers (Chrome, Safari, Firefox)
Situational

Browsers pass microphone access to websites that request it. If you've granted access to Google Meet, Notion Voice, or a transcription site, the browser may reopen access when loading those pages — sometimes even before you click anything. Chrome is the most aggressive about this.

Fix: In Chrome → chrome://settings/content/microphone → switch from "Allow" to "Ask" for each site. Also check installed extensions: some have microphone access without displaying any warning.
3
Zoom (and other video conferencing apps)
Documented

Zoom has had several documented instances of post-call audio access. Like with the camera, the microphone can remain active for a few minutes after a meeting ends, often linked to "clean-up" or audio calibration processes. Teams and Webex have similar behavior.

Fix: Configure Maclaw to alert you if Zoom accesses the mic more than 5 minutes after your last meeting. In the meantime, fully quitting Zoom (not just closing the window) after each call guarantees the audio process is released.
4
AI and Dictation Apps (Notion AI, Whisper, etc.)
New

With the massive integration of AI features in productivity apps, a new category is emerging: apps that listen in "hotword detection" mode — keeping minimal mic access to detect a keyword (like "Notion, note this"). Even if processing is local, the mic is technically active.

Fix: Explicitly disable dictation/AI voice features in each app's preferences. For Notion, Apple Intelligence, and similar apps, verify that "continuous listening" is disabled.
5
The App You Installed 3 Years Ago
Forgotten

Often the most surprising one. In my list, it was a voice translation utility I installed in 2023 for a project, never really used, and completely forgotten. It had microphone permission granted at installation — and was still using it, sporadically, for reasons I never understood.

Fix: System Settings → Privacy & Security → Microphone → review all listed apps. For each one you don't recognize or no longer actively use, remove access immediately.

How to see in real time which apps are using the mic

macOS shows a small orange icon in the menu bar when an app uses the mic. But this icon disappears quickly for short accesses — easy to miss if you're not looking at exactly the right moment.

For a complete log of recent accesses via Terminal:

log show --predicate 'subsystem == "com.apple.TCC"' --info --last 24h | grep -i "microphone"

This queries the macOS permission system (TCC — Transparency, Consent, and Control) and lists all microphone accesses in the last 24 hours.

Note: This command requires Full Disk Access in System Settings → Privacy. Terminal must be listed in that section.

5-minute quick audit

If you want to do a quick audit of your Mac right now, here's the procedure:

  1. Open System Settings → Privacy & Security → Microphone
  2. Note all apps with access enabled
  3. For each app: do you use it for calls or dictation? If not, disable it.
  4. Open Activity Monitor and sort by "Network Received" — identify active processes you don't recognize
  5. Install Maclaw to receive a Telegram alert for every future unexpected mic access

Good news: On Macs with Apple Silicon (M1 and later), macOS 14+ shows a persistent notification in the menu bar while any app uses the mic or camera. This is a significant improvement over previous versions.

The real question: are they listening to me?

The honest answer: probably not to spy on you, but your mic is less private than you think.

Legitimate apps access the mic for technical reasons, not to record your conversations. But these accesses are real, frequent, and rarely clearly documented. The difference between "Slack listens to detect if you want a Huddle" and "Slack is listening to me" matters — but the technical boundary between the two is blurry.

What's certain: without monitoring, you can't know. And not knowing means trusting by default companies whose business model is built on data.

Know Exactly When Your Mic Is Active

Maclaw logs every camera and microphone access with timestamp, process name, and duration. Instant Telegram alert the moment any app accesses your sensors.

Try Maclaw for Free
← Suspicious connection at 2 AM All articles →