Microsoft Threat Intelligence Podcast

Whisper Leak: How Threat Actors Can See What You Talk to AI About

6 snips
Dec 17, 2025
Jeff McDonald, a Microsoft security research lead specializing in ML model protections, and Jonathan Barr Orr, a hacker and vulnerability researcher, discuss Whisper Leak. They explain how token-by-token streaming and packet size/timing patterns can reveal topics in encrypted AI traffic. The conversation covers which models show signals, real-world adversaries, and developer mitigation approaches.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Encryption Isn't All You Think

  • WhisperLeak shows encrypted AI traffic can leak topic signals via packet size and timing patterns.
  • Side-channel leaks persist despite TLS because metadata like sizes/timings reveal structure.
INSIGHT

Token Streaming Creates Patterns

  • Tokens vary in length (1–7 chars) and LLM streaming sends those tokens incrementally.
  • That per-token streaming maps to observable packet-size patterns attackers can exploit.
INSIGHT

Obfuscation Alone Isn't Sufficient

  • Prior work reconstructed outputs from token-length sequences, but that defense is incomplete.
  • Obfuscating individual token lengths doesn't fully prevent topic inference attacks.
Get the Snipd Podcast app to discover more snips from this episode
Get the app