Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #privacy #compliance

#privacy #compliance

Scheduled Pinned Locked Moved Uncategorized
privacycompliance
20 Posts 17 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • beyondmachines1@infosec.exchangeB This user is from outside of this forum
    beyondmachines1@infosec.exchangeB This user is from outside of this forum
    beyondmachines1@infosec.exchange
    wrote last edited by
    #1

    #privacy #compliance

    Link Preview Image
    yaqubpk@mastodon.socialY david_chisnall@infosec.exchangeD G pteryx@dice.campP qgustavor@urusai.socialQ 8 Replies Last reply
    2
    0
    • R relay@relay.publicsquare.global shared this topic
    • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

      #privacy #compliance

      Link Preview Image
      yaqubpk@mastodon.socialY This user is from outside of this forum
      yaqubpk@mastodon.socialY This user is from outside of this forum
      yaqubpk@mastodon.social
      wrote last edited by
      #2

      @beyondmachines1 lol #JokeOfTheDay

      1 Reply Last reply
      0
      • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

        #privacy #compliance

        Link Preview Image
        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchange
        wrote last edited by
        #3

        @beyondmachines1

        If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

        If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

        There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

        V henryk@chaos.socialH jernej@androiddev.socialJ maccruiskeen@social.linux.pizzaM 4 Replies Last reply
        0
        • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

          @beyondmachines1

          If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

          If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

          There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

          V This user is from outside of this forum
          V This user is from outside of this forum
          vineyardsiren@mastodon.social
          wrote last edited by
          #4

          @david_chisnall @beyondmachines1 yes there is a small wakeup program that always listens for the activation word

          1 Reply Last reply
          0
          • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

            @beyondmachines1

            If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

            If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

            There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

            henryk@chaos.socialH This user is from outside of this forum
            henryk@chaos.socialH This user is from outside of this forum
            henryk@chaos.social
            wrote last edited by
            #5

            @david_chisnall @beyondmachines1 Compare with the Amazon design, who hard connect the "microphone disabled" LED to the microphone input amplifier powerdown pin.

            1 Reply Last reply
            0
            • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

              #privacy #compliance

              Link Preview Image
              G This user is from outside of this forum
              G This user is from outside of this forum
              gbsills@social.vivaldi.net
              wrote last edited by
              #6

              @beyondmachines1 Ah I see your problem, this is a techy thing. To disable microphones in Alexa, Google Home, etc, you need to use a hammer and throw everything into the trash bin outside the house. Be careful what you say outside around the trash bin until the trash is picked up.

              You are welcome!

              aadmaa2@mathstodon.xyzA 1 Reply Last reply
              0
              • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

                #privacy #compliance

                Link Preview Image
                pteryx@dice.campP This user is from outside of this forum
                pteryx@dice.campP This user is from outside of this forum
                pteryx@dice.camp
                wrote last edited by
                #7

                @beyondmachines1
                I mean, there are reasons that when I got myself a new laptop a couple of years back, I got one with *physical switches for the mic and camera*.

                1 Reply Last reply
                0
                • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                  @beyondmachines1

                  If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

                  If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

                  There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

                  jernej@androiddev.socialJ This user is from outside of this forum
                  jernej@androiddev.socialJ This user is from outside of this forum
                  jernej@androiddev.social
                  wrote last edited by
                  #8

                  @david_chisnall @beyondmachines1 yeah, that's pretty much exactly how it works.

                  It's actually triple stage (DSP hotword + CPU hotword + serverside hotword). Each of the models is larger and more accurate due to RAM requirements.

                  Programming the DSP with hotword program is a privileged operation though, only built-in apps can do it (among other things, due to the fact that the DSP doesn't have much of its own memory protection).

                  jernej@androiddev.socialJ 1 Reply Last reply
                  0
                  • jernej@androiddev.socialJ jernej@androiddev.social

                    @david_chisnall @beyondmachines1 yeah, that's pretty much exactly how it works.

                    It's actually triple stage (DSP hotword + CPU hotword + serverside hotword). Each of the models is larger and more accurate due to RAM requirements.

                    Programming the DSP with hotword program is a privileged operation though, only built-in apps can do it (among other things, due to the fact that the DSP doesn't have much of its own memory protection).

                    jernej@androiddev.socialJ This user is from outside of this forum
                    jernej@androiddev.socialJ This user is from outside of this forum
                    jernej@androiddev.social
                    wrote last edited by
                    #9

                    @david_chisnall @beyondmachines1 if I remember correctly, disabling the "Google" app will prevent the DSP configuration service from running and it should leave the DSP offline and without the hotword model.

                    1 Reply Last reply
                    0
                    • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

                      #privacy #compliance

                      Link Preview Image
                      qgustavor@urusai.socialQ This user is from outside of this forum
                      qgustavor@urusai.socialQ This user is from outside of this forum
                      qgustavor@urusai.social
                      wrote last edited by
                      #10

                      @beyondmachines1 While I understand the privacy issue, I wish there were good privacy aware alternatives.

                      For Google Home, there are many that use local keyword detection and local voice recognition with Home Assistant. From what I saw, it works wonders (if you get the right hardware).

                      But for Android? The best I found is an app that requires a persistent notification for the hot word to work. AFAIK Google crippled Android so they are the only ones that can build an app with efficient hot word detection "for security reasons". And no custom ROMs seem to have fixed that or developed alternatives ( including @GrapheneOS ... YET ).

                      1 Reply Last reply
                      0
                      • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

                        #privacy #compliance

                        Link Preview Image
                        mossman@social.vivaldi.netM This user is from outside of this forum
                        mossman@social.vivaldi.netM This user is from outside of this forum
                        mossman@social.vivaldi.net
                        wrote last edited by
                        #11

                        @beyondmachines1 my gaming laptop has a physical switch for the webcam (only time I've seen this) - I suppose a second switch for the mic would be extravangant, but maybe one switch could cancel both?

                        krans@mastodon.me.ukK 1 Reply Last reply
                        0
                        • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

                          #privacy #compliance

                          Link Preview Image
                          W This user is from outside of this forum
                          W This user is from outside of this forum
                          wouter@maly.io
                          wrote last edited by
                          #12

                          @beyondmachines1
                          That sadly can happen.

                          1 Reply Last reply
                          0
                          • mossman@social.vivaldi.netM mossman@social.vivaldi.net

                            @beyondmachines1 my gaming laptop has a physical switch for the webcam (only time I've seen this) - I suppose a second switch for the mic would be extravangant, but maybe one switch could cancel both?

                            krans@mastodon.me.ukK This user is from outside of this forum
                            krans@mastodon.me.ukK This user is from outside of this forum
                            krans@mastodon.me.uk
                            wrote last edited by
                            #13

                            @mossman Every “business” laptop I've used over the last decade has had a physical slide shutter to cover the webcam, and on many the shutter doubles as a switch to electrically disable the camera

                            @beyondmachines1

                            mossman@social.vivaldi.netM 1 Reply Last reply
                            0
                            • krans@mastodon.me.ukK krans@mastodon.me.uk

                              @mossman Every “business” laptop I've used over the last decade has had a physical slide shutter to cover the webcam, and on many the shutter doubles as a switch to electrically disable the camera

                              @beyondmachines1

                              mossman@social.vivaldi.netM This user is from outside of this forum
                              mossman@social.vivaldi.netM This user is from outside of this forum
                              mossman@social.vivaldi.net
                              wrote last edited by
                              #14

                              @krans @beyondmachines1 all my HP corporate/client laptops since ~2020 have had the shutter, but they don't cut power to the webcam (you get a dark grey smudgy image which clearly shows the shutter being opened and closed).

                              My gaming laptop appears to (and is supposed to) completely disable the webcam when switched, so if the microphone was on the same circuit (as someone else here said theirs does) then that would fix the privacy question.

                              1 Reply Last reply
                              0
                              • melgu@norden.socialM This user is from outside of this forum
                                melgu@norden.socialM This user is from outside of this forum
                                melgu@norden.social
                                wrote last edited by
                                #15

                                @hobart @beyondmachines1 @pluralistic Siri is correct. It is turned on. You could verify that in the system settings. You have disabled active connections to Bluetooth devices, but passive scanning (and Apple Watch connectivity) is still enabled.

                                For Bluetooth and WiFi there are basically three modes: Active and connecting (indicated by blue icon in control center), Active bit not connecting (indicated by white icon) and disabled (indicated by gray icon and disabled state in settings).

                                1 Reply Last reply
                                0
                                • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                                  @beyondmachines1

                                  If I understand correctly how this works: There is a small always-on low-power core that is recording everything to a small buffer and doing a small amount of signal processing to see if there's a reasonable chance that you've said the activation phrase. When it detects this trigger, it wakes up the main core, which grabs the buffer and does some more complex signal processing to see if you really (or, at least, with much higher probability) said the activation phrase. If so, it's then forwarded to the thing that processes the command.

                                  If the code on the main core doesn't have microphone access, the core is still woken up, but then the process that tries to check if you really said the activation phrase fails because it can't access the microphone.

                                  There's probably an interesting side channel where a malicious version could (assuming the low-power core doesn't hardcode 'Okay Google') rapidly program different activation phrases to get a reasonably high probability of whether specific things are said.

                                  maccruiskeen@social.linux.pizzaM This user is from outside of this forum
                                  maccruiskeen@social.linux.pizzaM This user is from outside of this forum
                                  maccruiskeen@social.linux.pizza
                                  wrote last edited by
                                  #16

                                  @david_chisnall @beyondmachines1 Though Joe Average User coud be forgiven for thinking that telling something to turn off means "all off" and not "mostly off," even though "mostly off" is the default for most electronics these days unless you physically cut the power.

                                  david_chisnall@infosec.exchangeD bornach@vis.socialB 2 Replies Last reply
                                  0
                                  • maccruiskeen@social.linux.pizzaM maccruiskeen@social.linux.pizza

                                    @david_chisnall @beyondmachines1 Though Joe Average User coud be forgiven for thinking that telling something to turn off means "all off" and not "mostly off," even though "mostly off" is the default for most electronics these days unless you physically cut the power.

                                    david_chisnall@infosec.exchangeD This user is from outside of this forum
                                    david_chisnall@infosec.exchangeD This user is from outside of this forum
                                    david_chisnall@infosec.exchange
                                    wrote last edited by
                                    #17

                                    @maccruiskeen @beyondmachines1

                                    From a security perspective, they should be equivalent (nothing that can talk to a network sees the microphone data, just a 1-bit wakeup signal). Modulo side channels, of course.

                                    1 Reply Last reply
                                    0
                                    • maccruiskeen@social.linux.pizzaM maccruiskeen@social.linux.pizza

                                      @david_chisnall @beyondmachines1 Though Joe Average User coud be forgiven for thinking that telling something to turn off means "all off" and not "mostly off," even though "mostly off" is the default for most electronics these days unless you physically cut the power.

                                      bornach@vis.socialB This user is from outside of this forum
                                      bornach@vis.socialB This user is from outside of this forum
                                      bornach@vis.social
                                      wrote last edited by
                                      #18

                                      @maccruiskeen @david_chisnall @beyondmachines1
                                      Joe Average User will be thinking:
                                      https://imgflip.com/i/208ldv

                                      1 Reply Last reply
                                      0
                                      • beyondmachines1@infosec.exchangeB beyondmachines1@infosec.exchange

                                        #privacy #compliance

                                        Link Preview Image
                                        epic_null@infosec.exchangeE This user is from outside of this forum
                                        epic_null@infosec.exchangeE This user is from outside of this forum
                                        epic_null@infosec.exchange
                                        wrote last edited by
                                        #19

                                        @beyondmachines1 The problem I have is this is behavior I want - because it's proof I am being lied to. If the message were to stop, how would I know?

                                        1 Reply Last reply
                                        0
                                        • G gbsills@social.vivaldi.net

                                          @beyondmachines1 Ah I see your problem, this is a techy thing. To disable microphones in Alexa, Google Home, etc, you need to use a hammer and throw everything into the trash bin outside the house. Be careful what you say outside around the trash bin until the trash is picked up.

                                          You are welcome!

                                          aadmaa2@mathstodon.xyzA This user is from outside of this forum
                                          aadmaa2@mathstodon.xyzA This user is from outside of this forum
                                          aadmaa2@mathstodon.xyz
                                          wrote last edited by
                                          #20

                                          @gbsills @beyondmachines1 You can also disabled the ones in your cell phone the same way: take that hammer and smash your income into thousands of pieces; live on lithium and shards of gorilla glass in your final days alive in the West

                                          1 Reply Last reply
                                          0
                                          • em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange shared this topic
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups