How to Know If Someone Is Secretly Transcribing Your Meeting
The Red Dot Doesn't Protect You Anymore
Most people assume their meetings are private. After all, Zoom shows a red recording indicator when someone hits record. Google Meet displays a notification. Microsoft Teams announces it to everyone in the call. These platform-level indicators have been the default trust signal for years: if no one is recording, you're safe.
That assumption is no longer true.
A new generation of AI meeting transcription tools has made it possible for any participant to capture a complete transcript of your meeting — without triggering any platform indicator, without joining a visible bot, and without anyone else in the meeting knowing it's happening.
Tools like Granola, Otter.ai's desktop app, and Fireflies can silently capture meeting audio through a participant's system audio pipeline. They don't interact with the meeting platform at all. They listen to what comes out of the speaker — the same audio the participant hears — and transcribe it in real time using AI.
The result: your words are being recorded, transcribed, and stored on a third-party server, and you have absolutely no way to tell from inside the meeting.
Nullify is a free meeting privacy tool built specifically to solve this problem. It detects stealth transcription tools running on your machine or behaving suspiciously on your network, and alerts you before your meeting audio is captured and sent to third-party servers.
How Stealth Transcription Tools Actually Work
To understand why these tools are invisible, you need to understand how they differ from traditional meeting recording.
Traditional Meeting Bots (Visible)
Older transcription services like the original Otter.ai or Fireflies.ai worked by joining your meeting as a separate participant — a bot. You'd see something like "Otter.ai Notetaker" appear in the participant list. The meeting host could remove it. Everyone knew it was there.
System Audio Capture (Invisible)
Granola and similar modern tools take a fundamentally different approach. They install as a desktop application on the participant's computer and capture audio directly from the system's audio output. This means:
- No bot joins the meeting. There is no additional participant in the call.
- No platform indicator is triggered. Zoom, Meet, and Teams have no idea audio is being captured.
- No notification is sent to other participants. The platform cannot detect what's happening outside its own process.
- The tool works on any meeting platform. Since it captures system audio, it doesn't matter whether you're on Zoom, Teams, Meet, WebEx, or even a phone call routed through the computer.
From the perspective of every other participant in the meeting, nothing has changed. There is no visible sign. The meeting looks and feels completely normal.
Signs Someone Might Be Transcribing Your Meeting
Honestly, the most important thing to know is this: most stealth transcription tools produce no detectable signs inside the meeting itself. That's what makes them stealth tools.
That said, there are a few indirect indicators you can watch for, though none are reliable on their own:
Behavioral Cues
- A participant seems unusually relaxed about note-taking. If someone who usually takes detailed notes is suddenly hands-free and fully present, they may be relying on automated transcription.
- Verbatim quotes appear later. If someone sends follow-up emails or messages that contain exact phrasing from the meeting (not paraphrased — exact), they may have access to a transcript.
- AI-generated meeting summaries appear. If you receive a meeting summary that's suspiciously thorough and well-structured, it was likely generated from a transcript, not from memory.
Technical Cues (On Your Own Machine)
- Increased CPU or network activity during meetings. Transcription tools process audio in real time, which can cause a small but measurable increase in system resource usage.
- Unfamiliar processes running in the background. Apps like Granola run as background processes that may appear in your system's Activity Monitor or Task Manager.
But here's the reality: if someone else in the meeting is running a stealth transcription tool on their own machine, you cannot detect it from yours through observation alone. The audio capture happens entirely on their device.
The Scale of the Problem
This isn't a fringe concern. Granola reached a $1.5 billion valuation after raising $125 million in March 2026. It has millions of users. Otter.ai has been downloaded millions of times. Fireflies, Fathom, and dozens of other tools serve millions more.
The market for AI meeting transcription is enormous and growing rapidly. According to industry estimates, a significant percentage of knowledge workers now use some form of AI meeting assistant. Many of these tools are marketed specifically on the premise that they're invisible — that they "just work in the background" without disrupting the meeting.
This means that in any given meeting with four or more participants, the probability that at least one person is running a stealth transcription tool is increasingly high. And that probability grows with every quarter as these tools gain adoption.
For a deeper look at the legal and ethical dimensions of this trend, read our investigation into the invisible meeting transcription problem.
Why Platform-Level Solutions Don't Work
Some people assume that meeting platforms will eventually solve this problem. They won't — at least not through platform features alone. Here's why:
Stealth transcription tools operate outside the meeting platform's control. Zoom can detect when its own recording feature is used. It cannot detect when a separate application on a participant's computer is capturing system audio. This is a fundamental architectural limitation, not a bug that can be patched.
Meeting platforms would need to control the entire operating system audio pipeline to prevent this kind of capture — something that's neither technically feasible nor within their scope.
How Nullify Detects Stealth Transcription
Nullify takes a different approach. Instead of relying on meeting platform indicators, it monitors at the system level — the same level where stealth transcription tools operate.
Process Monitoring
Nullify continuously monitors running processes on your system, looking for the signatures of known transcription tools. When it detects that a tool like Granola, Otter.ai, or Fireflies is running, it alerts you immediately. This works because the transcription tool must run as a process on someone's machine — and if it's on your machine, or detectable through network behavior, Nullify can find it.
Network Analysis
Many transcription tools send audio data or transcription results to external servers in real time. Nullify monitors network traffic for patterns consistent with audio data being transmitted to known transcription service endpoints. This provides a second detection layer that works even if a tool disguises its process name.
Audio Shield
When a stealth transcription tool is detected, Nullify can activate its Audio Shield — a feature that introduces carefully calibrated audio interference that disrupts machine transcription while remaining minimally noticeable to human listeners. This means the transcription tool captures garbled, unusable audio while your actual meeting conversation continues normally.
What You Can Do Right Now
If you're concerned about secret meeting transcription — and given the scale of adoption, you probably should be — here are concrete steps:
-
Install Nullify. It's free and runs in the background, monitoring for stealth transcription tools during your meetings.
-
Know your legal rights. Many jurisdictions require all-party consent for recording conversations. If someone is transcribing your meeting without your knowledge, they may be breaking the law. See our guide on the legal landscape of invisible transcription.
-
Ask directly. At the start of important meetings, ask: "Is anyone using any AI transcription or note-taking tools?" A direct question, while not foolproof, establishes a social norm around consent.
-
Learn how specific tools work. Understanding how individual tools operate helps you assess your risk. Read our detailed guide on how to block Granola specifically.
Protecting Your Meeting Privacy
The shift from visible meeting bots to invisible system-level transcription represents a fundamental change in meeting privacy. The old trust model — "if I don't see a recording indicator, I'm not being recorded" — is broken.
The only reliable way to detect stealth transcription is to monitor at the same level these tools operate: the system level. That's exactly what Nullify does.
Download Nullify for free and take back control of your meeting privacy. It runs silently in the background, watching for the tools that are watching you.
Protect Your Meeting Privacy
Download Nullify for free and detect invisible transcription tools.
Download Nullify