Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
Yes... And no.
I don't like taking things for granted.
While I use a smartphone (zuk z2 pro / mokee) and have a smart TV (panasonic with firefox os) I avoided Alexa and other gadgets / assistants like the plague. I don't care that much about internet traces - devRant the only social platform I use.
Most conversation of you and your friend takes place in my brain... (example Alexa)
"oh that looks shiny. Wants..."
"wait - how can this work"
"oh great. it requires internet access.... everything goes to the cloud..."
"Not so shiny anymore... But if it stores data in the cloud... And it's voice based... What's the legal context? Can it be used in court?"
<hitting the internet>
"OK. It's official: Never ever do I want such a thingie in my house. Enact P
perma life ban"
And to add some context....the legal context is very very very muddy -
stop68024yThe downstream is hackable there is an talk where someone could read the downstream and saw that really important stuff was received in plain text.
-
@Root And iOS devices! Or, until proven otherwise by means of publicly review able code, I'll presume it isn't as privacy friendly/secure :)
-
@Root and iOS phones, they are literally listening to you all the time waiting for you to say Siri and then storing what you say so they can recognize you saying Siri in the background better later on....
-
@Root I'd like to see the source code so I can check that and make a reproducible build
-
Root797674y@linuxxx Me too ๐
But it’s Apple, so. There’s no way to know. But they don’t seem to lie about security things so I’m at least a little okay with taking them at their word? Still not happy about it. -
@Root I get what you're saying, I just don't agree since Apple is integrated within PRISM and the other possible apple devices backdooring program ran by the NSA (the reason Snowden dropped all Apple devices when fleeing)
Related Rants
-
blockchaintacos19D: โDid the attackers exfiltrate any data?โ M: โI canโt say for sure, but most likely based onโโ ...
-
boombodies12Corporate IT: Here at Company A we are very proactive about CyberSecurity! Dev: What is our cybersecurity pla...
-
boombodies11Corporate IT: YOU MUST COME INTO THE OFFICE. WE JUST RECEIVED AN URGENT NOTIFICATION FROM APPLE OF A SECURITY ...
!dev - cybersecurity related.
This is a semi hypothetical situation. I walked into this ad today and I know I'd have a conversation like this about this ad but I didn't this time, I had convo's like this, though.
*le me walking through the city centre with a friend*
*advertisement about a hearing aid which can be updated through remote connection (satellite according to the ad) pops up on screen*
Friend: Ohh that looks usefu.....
Me: Oh damn, what protocol would that use?
Does it use an encrypted connection?
How'd the receiving end parse the incoming data?
What kinda authentication might the receiving end use?
Friend: wha..........
Me: What system would the hearing aid have?
Would it be easy to gain RCE (Remote Code Execution) to that system through the satellite connection and is this managed centrally?
Could you do mitm's maybe?
What data encoding would the transmissions/applications use?
Friend: nevermind.... ._________.
Cybersecurity mindset much...!
rant
cybersecurity