Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. #privacy #compliance

#privacy #compliance

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
privacycompliance
6 Indlæg 6 Posters 25 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • beyondmachines1@infosec.exchangeB This user is from outside of this forum
    beyondmachines1@infosec.exchangeB This user is from outside of this forum
    beyondmachines1@infosec.exchange
    wrote sidst redigeret af
    #1

    #privacy #compliance

    yaqubpk@mastodon.socialY david_chisnall@infosec.exchangeD gbsills@social.vivaldi.netG 3 Replies Last reply
    1
    0
    • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

      #privacy #compliance

      yaqubpk@mastodon.socialY This user is from outside of this forum
      yaqubpk@mastodon.socialY This user is from outside of this forum
      yaqubpk@mastodon.social
      wrote sidst redigeret af
      #2

      @beyondmachines1 lol #JokeOfTheDay

      1 Reply Last reply
      0
      • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

        #privacy #compliance

        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchange
        wrote sidst redigeret af
        #3

        @beyondmachines1

        If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

        If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

        There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

        V henryk@chaos.socialH 2 Replies Last reply
        0
        • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

          @beyondmachines1

          If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

          If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

          There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

          V This user is from outside of this forum
          V This user is from outside of this forum
          vineyardsiren@mastodon.social
          wrote sidst redigeret af
          #4

          @david_chisnall @beyondmachines1 yes there is a small wakeup program that always listens for the activation word

          1 Reply Last reply
          0
          • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

            @beyondmachines1

            If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

            If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

            There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

            henryk@chaos.socialH This user is from outside of this forum
            henryk@chaos.socialH This user is from outside of this forum
            henryk@chaos.social
            wrote sidst redigeret af
            #5

            @david_chisnall @beyondmachines1 Compare with the Amazon design, who hard connect the "microphone disabled" LED to the microphone input amplifier powerdown pin.

            1 Reply Last reply
            0
            • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

              #privacy #compliance

              gbsills@social.vivaldi.netG This user is from outside of this forum
              gbsills@social.vivaldi.netG This user is from outside of this forum
              gbsills@social.vivaldi.net
              wrote sidst redigeret af
              #6

              @beyondmachines1 Ah I see your problem, this is a techy thing. To disable microphones in Alexa, Google Home, etc, you need to use a hammer and throw everything into the trash bin outside the house. Be careful what you say outside around the trash bin until the trash is picked up.

              You are welcome!

              1 Reply Last reply
              0
              • jwcph@helvede.netJ jwcph@helvede.net shared this topic
              Svar
              • Svar som emne
              Login for at svare
              • Ældste til nyeste
              • Nyeste til ældste
              • Most Votes


              • Log ind

              • Har du ikke en konto? Tilmeld

              • Login or register to search.
              Powered by NodeBB Contributors
              Graciously hosted by data.coop
              • First post
                Last post
              0
              • Hjem
              • Seneste
              • Etiketter
              • Populære
              • Verden
              • Bruger
              • Grupper