this post was submitted on 01 May 2024
314 points (88.3% liked)

Technology

59312 readers
5006 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 6 months ago* (last edited 6 months ago) (2 children)

It most likely is

Instead of guessing, you people need to learn to use Wireshark and find out for yourself.

No, they don't just listen all the time with an open mic and just send all audio to the cloud. Anyone in cybersecurity would definitely notice that and sound the alarm. There's probably tens of thousands of people watching what these companies and their tech do all day long.

They can get all the data they need through other means, like trackers. Most of us aren't consciously aware of the metric shitton of bread crumbs we all leave behind on the net.

[–] [email protected] 2 points 6 months ago

Wireshark may or may not help you here. The proposed mechanism is abusing the wake words, which are processed locally on the device. Each marketing wake word could be processed, set a flag and go back to sleep with no network activity. Periodically a bit array of flags would be sent to the server with any other regular traffic (checking for notifications, perhaps). The actual audio never gets sent. I'm not saying that Facebook actually does this, but it's a reasonable explanation for the behaviour seen in the Vice article.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago) (1 children)

No, they don’t just listen all the time with an open mic and just send all audio to the cloud. Anyone in cybersecurity would definitely notice that and sound the alarm.

How would they though? The mic is already known to be always on, and what the servers/back-end are doing with the mic input data is not viewable/known by us on the outside. So how would those 'cybersecurity' people know?

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~

[–] [email protected] 3 points 6 months ago* (last edited 6 months ago) (1 children)

If you're monitoring the traffic, and you start speaking, and you suddenly see packets spewing out of a device every time you talk, that's a good indication. There's indirect methods to analyze it without necessarily being able to see the actual data.

Poking around the PCB with an oscilloscope to see electrical signals will probably be useful too.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago) (1 children)

If you’re monitoring the traffic, and you start speaking, and you suddenly see pac6kers spewing out of a device every time you talk, that’s a good indication. There’s indirect methods to analyze it without necessarily being able to see the actual data.

Its already established that the mic always hot, and that data is always being sent to the server.

What they do with the data is not seeable by us. That is the point being discussed, do they listen in to conversations and market off of that data to us.

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~

[–] [email protected] 3 points 6 months ago (1 children)

Its already established that the mic always hot, and that data is always being sent to the server.

Tell me, how have you established this? What were your methods?

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago) (1 children)

Its already established that the mic always hot, and that data is always being sent to the server.

Tell me, how have you established this? What were your methods?

By calling out for the Google assist, without having pushed any button first. It's always listening for the activate/initiate key phrase.

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~

[–] [email protected] 3 points 6 months ago (1 children)

That doesn't mean it's sending anything out through the network connection. The wake word is locally processed.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago) (1 children)

That doesn’t mean it’s sending anything out through the network connection. The wake word is locally processed.

Doesn't mean it's not, either.

This old article from Vice seems to have proven it, back in 2018.

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~

[–] [email protected] 1 points 6 months ago* (last edited 6 months ago) (1 children)

This entire article is full of absolutely nothing but speculation with no sources and poor experimentation without proper knowledge in the field, software, or equipment. No technical analysis at all. This person kind of has no clue and is taking ignorant shots in the dark to try to confirm preexisting notions. The "experiment" they ran sounds like something my mother would do and then get all bent out of shape and frantically call me about it.

I want the 5 minutes back I wasted reading that.

[–] [email protected] -4 points 6 months ago* (last edited 6 months ago)

I want the 5 minutes back I wasted reading that.

All of your hyperbole aside, if you're worried about time wasted, you really shouldn't be on the Internet.

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~