Comment on Cox deletes ‘Active Listening’ ad pitch after boasting that it eavesdrops though our phones

<- View Parent
GenderNeutralBro@lemmy.sdf.org ⁨6⁩ ⁨months⁩ ago

Sorry if this is a noob question, but…how?

DNS will tell you the server name and address, which would just be some server owned by the company. Nothing weird there unless they have the chutzpah to name it something telling. They could even bypass DNS entirely with hardcoded IP addresses.

Timing wouldn’t be a great indicator either if they aggregate requests.

They could slide anything nefarious in with daily software update checks or whatever other phone-homing they normally do, and without deep packet inspection or reverse engineering the software, it would be very difficult to tell.

I don’t think Wireshark can do deep packet inspection, can it? Assuming the client is using SSL and verifying certs, maybe even using cert pinning?

Size would be a big indicator if they’re sending full voice recordings, but not if they’re doing voice recognition locally and only sending transcripts, metadata, or keywords.

I’ve never actually done this kind of work in earnest, and my experience with Wireshark is at least a decade out of date. I’m just approaching this from the perspective of “if I were a corporate shitbag, how would I implement my shitbaggery?”

source
Sort:hotnewtop