Every modern person knows about the possibility of tracking the actions of a user of computer equipment. It is recommended to avoid total surveillance by pasting cameras and microphones with tape, disconnecting headsets and web-cameras for a time when they are not needed. However, serious hackers or special services easily bypass such amateurish ways of protecting information using sophisticated technical methods. The numerous sensors installed in our computers or smartphones can be used to remove information that is necessary for specialists. For example, cybersecurity experts demonstrated how to use the added special frequency in the soundtrack of a YouTube video on a fitness tracker to change the sensor’s performance, however, the network has information about a technically more complicated method of tracking computer users by recording audio from sources without a microphone sound located next to the PC. In this case, hard disks equipped with a feedback system are used. This technology is necessary for accurate positioning of the magnetic heads above the surface of the disk plate. The resulting compensation currents are generated from audio waves, including the sounds of people talking next to a PC. In the future, using special software, attackers can decrypt sensor data and decrypt audio recording of a conversation. The information obtained in this way is of high quality and can serve as a source of leakage of important data blurted out by a user located next to a computer.