Skip to main content

How to use phone as a Microphone

 WO Mic can turn your phone to be a microphone for your computer. You need not to pay a cent to buy any gadget. And it's mobile if you choose wireless transport. Millions of people have installed it and are using it daily for talking, recording, voice remote control and many other activities.

There are three components that cooperate to achieve that:
 

WO Mic App which runs on phone. It captures your voice through phone microphone and transmit them to computer. 

WO Mic Client which runs on computer. It connects to app, receives voice data and passes them to virtual mic device.

WO Mic Virtual Device which also runs on computer, though in kernel space. It receives voice data from client program, simulates a real microphone device, and provides audio data to applications like Sound Recorder.

Main Features:

Easy to use and configure.

Supports autoconnection when your PC reboots.

Supports multile connection methods: USB, Wi-Fi, Bluetooth and Wi-Fi direct.

Audio format: 48000 sampling rate, 16 bits per sample, mono channel.

Very short lag.

Can be used with any programs on the PC just like a real microphone; Zoom, Microsoft Teams, Screen recording apps and more.

Installation

Linux
The WO mic client can be installed on any Linux distribition but currently, it only supports x86_64 bit architectures. You can download the app image here.

Afterwards, make it executable using 2 methods.

Method 1

Navigate to the location of the app image, right-click on it and select properties. On the permissions tab, check the box labelled allow executing file as program.

Method 2

Open your terminal and run the following command:

 sudo chmod +x micclient-x86_64.AppImage  

Install the Wo Mic app on your mobile phone. Works on Android and iOS.

For Android users, open the Play Store and type WO Mic in the search bar.

iOS users can download the app from the App store. Just type WO Mic in the search bar.

If you cannot access the Google Play Store, you can download the apk directly here.

To make a connection between the app on your phone and your PC:

Load the aloop module from your terminal using the following command. This module will form a full-duplex loopback soundcard.

 sudo modprobe snd-aloop  

WO Mic client writes audio data into loopback device. If you encounter any glitches, try running the program as root so that its scheduling can be more aggressive. 

There are 4 methods that can be used for connection: Wi-Fi, Bluetooth, Wi-Fi direct and USB.

Connection by Wi-Fi is made using the IP address of your phone which can be found on the mobile app. Just tap on the play icon and the IP address will appear. Use the following command in your terminal

  ./micclient-x86_64.AppImage -t Wifi 192.168.1.100  

Connection by bluetooth. xx:xx:xx:xx:xx:xx represents the bluetooth address of your phone. You can find it on your phone's settings. Open settings on your phone>About Phone>Status>Bluetooth Address.

 ./micclient-x86_64.AppImage -t Bluetooth xx:xx:xx:xx:xx:xx  

Windows 

Third party programs like Zoom and Microsoft Teams can make use of captured  data through loopback device. For example:

 arecord -c 1 -r 48000 -f S16_LE -D "hw:CARD=Loopback,DEV=1,SUBDEV=0" foo.wav  

 Check out my portfolio below

 

 

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

Fun Terminal Commands Every Linux User Should Try

Accessing Maps from the terminal with MapSCII Requirements Telnet installed Internet Connection Firewall is disabled You can do this on Linux, Unix, Mac OS X or Windows with an app like PuTTY or the Windows 10 Linux bash shell or any Os that supports telnet. Open terminal and write the command below. telnet mapscii.me Hit enter and you're ready to browse and enjoy MapSCII. Navigate using the keyboard or mouse. Use the following keys on your keyboard Arrow keys: up, down, right, left A to zoom in Z to zoom out C toggles ASCII mode on/off You can also click and drag and hold on the map with your cursor. If your connection dropped without a reason, reconnect with telnet -E mapscii.me and use only cursors, A and Z to navigate. The Mapscii project is open source and you can install it locally if you'd like. Check out their project here on GitHub . The Dancing ASCII Party Parrot Requirements Curl installed Internet

SQL for Data Analysis - Udacity

  Entity Relationship Diagrams An  entity relationship diagram  (ERD) is a common way to view data in a database. Below is the ERD for the database we will use from Parch & Posey. These diagrams help you visualize the data you are analyzing including: The names of the tables. The columns in each table. The way the tables work together. You can think of each of the boxes below as a spreadsheet. What to Notice In the Parch & Posey database there are five tables (essentially 5 spreadsheets): web_events accounts orders sales_reps region You can think of each of these tables as an individual spreadsheet. Then the columns in each spreadsheet are listed below the table name. For example, the  region  table has two columns:  id  and  name . Alternatively the  web_events  table has four columns. The "crow's foot" that connects the tables together shows us how the columns in one table relate to the columns in another table. In this first lesson, you will be learning the bas

Impressive - Check if Your Email Address Has Been Hacked - Free,Easy Tutorial

haveibeenpwned.com Data breaches are rampant and many people don't appreciate the scale or frequency with which they occur. A "breach" is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. How is the legitimacy of a data breach established? Attackers often give "breach" announcements, which are later revealed to be hoaxes. There is a delicate balance to be struck between making data searchable as soon as possible and conducting proper due diligence to confirm the breach's validity. In order to verify the authenticity of a violation, the following steps are normally taken: Has the affected provider made a public statement about the security breach? Does the information stolen in the breach show up in a Google search (i.e., it was simply copied from another source)? Is the structure of the data consistent with what you'd expect to see in a breach? Have