Onboard are >=2 bits of code. At least one of those is a specific system trained to recognize a “wake word”. This specific system (ostensibly) doesn’t send anything to an outside party. Its entire job is to recognize one wake phrase: Alexa, Ok Google, or Siri, and then if that wake phrase is used it responds and tells the second system to listen. As you can imagine, this is a pretty easy job to get right 80% of the time. So that can be put on a chip. So then it does its job, and it’s the second system that sends everything to an internet service for whatever reason.
I’d love to have this properly audited sometime. I’d slap like to think that we’re generally protected from big companies doing unethical and unjust things to us, by law, … but nah
why is this downvoted? you cant prove its not, if its proprietry. and since the companies listening just happen to profit off data collection (and break/bend the law often), its safe to assume they do this.
Want an honest answer?
Onboard are >=2 bits of code. At least one of those is a specific system trained to recognize a “wake word”. This specific system (ostensibly) doesn’t send anything to an outside party. Its entire job is to recognize one wake phrase: Alexa, Ok Google, or Siri, and then if that wake phrase is used it responds and tells the second system to listen. As you can imagine, this is a pretty easy job to get right 80% of the time. So that can be put on a chip. So then it does its job, and it’s the second system that sends everything to an internet service for whatever reason.
I didn’t ask for honesty!
I’d love to have this properly audited sometime. I’d slap like to think that we’re generally protected from big companies doing unethical and unjust things to us, by law, … but nah
Nah, they’re always listening, what you described is just a placebo button.
why is this downvoted? you cant prove its not, if its proprietry. and since the companies listening just happen to profit off data collection (and break/bend the law often), its safe to assume they do this.
Because you can prove it by monitoring network requests with a packet sniffer, which has been done.
Interesting. I haven’t seen this myself but it wouldn’t really surprise me.
It’s a standard tactic for people who do networking things
Yeah. I work in that general field but not at the user level like that so never got into packet sniffing. Now’s as good a time as ever eh?
Probably bots controlled by people hired by the companies that spy on us through those things.