this post was submitted on 16 Oct 2023
1746 points (99.3% liked)

internet funeral

6901 readers
1 users here now

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤart of the internet

What is this place?

!hmmm@lemmy.world with text and titles

• post obscure and surreal art with text

• nothing memetic, nothing boring

• unique textural art images

• Post only images or gifs (except for meta posts)

Guidlines

• no video posts are allowed

• No memes. Not even surreal ones. Post your memes on !surrealmemes@sh.itjust.works instead

• If your submission can be posted to !hmmm@lemmy.world (I.e. no text images), It should be posted there instead

This is a curated magazine. Post anything and everything. It will either stay up or be lost into the void.

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Fuck_u_spez_@sh.itjust.works 32 points 1 year ago* (last edited 1 year ago) (2 children)

https://labs.sogeti.com/google-home-spying/

As you can see from the graph above, we have sharp spikes of data being sent around the times the hot word and commands were sent. The Google Home performed as expected. As the device booted up, there was some data transfer, otherwise the network was relatively quiet between commands. We also proved that when the device microphone is muted, none of the hot word triggers or talking caused an increase in network traffic.

This is an old article based on an older device but you can test a new one for yourself with some pretty basic networking knowledge and equipment.

[–] Rootiest@lemmy.world 22 points 1 year ago* (last edited 1 year ago) (3 children)

This.

As the article suggests: "Should you trust them not to be spying on you?" Hell no!

But we can also use freely available tools to verify this.

This is even more potent on your phone.

A lot of people seem to believe your phone is listening to you all the time and feeding you ads based on your IRL conversations.

That's not happening, and this can be easily verified even without any networking knowledge/tools by taking a look at your cell phone data bill.

Recording and uploading your mundane conversations all day long would be a huge drain on your battery and an expensive addition to your cell data bill. You would likely notice if it was happening.

Again: by all means DO NOT TRUST THESE COMPANIES, but also maybe do a little testing before assuming all private conversations are being recorded.

[–] DudeDudenson@lemmings.world 3 points 1 year ago

I mean google literally keeps all your voice to text transcriptions(if you use the feature) and location history by default. It wouldn't be such a far fetch to think the device does basic analysis locally and sends ad recommendations along with everything else

[–] idiomaddict@feddit.de 3 points 1 year ago (1 children)

But my battery is shit and I’m always connected to Wi-Fi

[–] Rootiest@lemmy.world 3 points 1 year ago (2 children)

WiFi makes it easier IMO.

It's very simple to snoop all the WiFi traffic and verify what is being sent while it's more challenging to get those details on cell data

[–] TigrisMorte@kbin.social 1 points 1 year ago

Please do tell what is in the encrypted packets it phoned home with?

[–] idiomaddict@feddit.de 1 points 1 year ago

Sadly, it’s not my Wi-Fi

[–] drathvedro@lemm.ee -2 points 1 year ago (1 children)

That's quite a terrible test though. I'm not a security expert but even I can think of quite a few ways they could've hidden traffic from such tests, even unintentionally. If Google is that evil, they know they have to be smart about it. And, unfortunately, they are both. So I wouldn't trust anything but a complete software and hardware analysis, painstakingly checking every circuit and processor instruction. But then, why even bother, the whole thing is like hiring a child molester as a kindergarten teacher.

[–] pascal@lemm.ee 3 points 1 year ago (1 children)

Oh, yes I agree. If you want to be malicious, you can think of many ways to go around it. You could use a physical switch that kills the circuit to the microphone and say "see? it's physically impossible to listen if the microphone wires are not even connected!" and then hide a second microphone inside the speaker chassis. But unless you're a valuable target, I prefer my Occam's razor to be the appropriate kind of sharpness.

[–] drathvedro@lemm.ee 1 points 1 year ago

Oh, they definitely want to be malicious. Afterall, their livelyhood depends on it, and there's are literal tons of money on the table for knowing exactly the things that people don't want to be known about them. That's why I referred to them as pedos in kindergarten: they look like a data hoarding company, swim like a data hoarding company and quack like a data hoarding company. They might play it nice for now and test waters, but ultimately, what they are after all along is your personal data and especially private data. No way you can bet on them not acting upon this temptation.