• Cosmic Cleric@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    6 months ago

    No, they don’t just listen all the time with an open mic and just send all audio to the cloud. Anyone in cybersecurity would definitely notice that and sound the alarm.

    How would they though? The mic is already known to be always on, and what the servers/back-end are doing with the mic input data is not viewable/known by us on the outside. So how would those ‘cybersecurity’ people know?

    Anti Commercial-AI license

    • TimeSquirrel@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      6 months ago

      If you’re monitoring the traffic, and you start speaking, and you suddenly see pac6kers spewing out of a device every time you talk, that’s a good indication. There’s indirect methods to analyze it without necessarily being able to see the actual data.

      Poking around the PCB with an oscilloscope to see electrical signals will probably be useful too.

      • Cosmic Cleric@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        6 months ago

        If you’re monitoring the traffic, and you start speaking, and you suddenly see pac6kers spewing out of a device every time you talk, that’s a good indication. There’s indirect methods to analyze it without necessarily being able to see the actual data.

        Its already established that the mic always hot, and that data is always being sent to the server.

        What they do with the data is not seeable by us. That is the point being discussed, do they listen in to conversations and market off of that data to us.

        Anti Commercial-AI license

        • TimeSquirrel@kbin.social
          link
          fedilink
          arrow-up
          0
          ·
          6 months ago

          Its already established that the mic always hot, and that data is always being sent to the server.

          Tell me, how have you established this? What were your methods?

          • Cosmic Cleric@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            6 months ago

            Its already established that the mic always hot, and that data is always being sent to the server.

            Tell me, how have you established this? What were your methods?

            By calling out for the Google assist, without having pushed any button first. It’s always listening for the initiate key phrase.

            Anti Commercial-AI license

            • TimeSquirrel@kbin.social
              link
              fedilink
              arrow-up
              0
              ·
              6 months ago

              That doesn’t mean it’s sending anything out through the network connection. The wake word is locally processed.

                • TimeSquirrel@kbin.social
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  6 months ago

                  This entire article is full of absolutely nothing but speculation with no sources and poor experimentation without proper knowledge in the field, software, or equipment. No technical analysis at all. This person kind of has no clue and is taking ignorant shots in the dark to try to confirm preexisting notions. The “experiment” they ran sounds like something my mother would do and then get all bent out of shape and frantically call me about it.

                  I want the 5 minutes back I wasted reading that.