No, they don’t just listen all the time with an open mic and just send all audio to the cloud. Anyone in cybersecurity would definitely notice that and sound the alarm.
How would they though? The mic is already known to be always on, and what the servers/back-end are doing with the mic input data is not viewable/known by us. So how would they know?
SapientLasagna@lemmy.ca 6 months ago
Wireshark may or may not help you here. The proposed mechanism is abusing the wake words, which are processed locally on the device. Each marketing wake word could be processed, set a flag and go back to sleep with no network activity. Periodically a bit array of flags would be sent to the server with any other regular traffic (checking for notifications, perhaps). The actual audio never gets sent. I’m not saying that Facebook actually does this, but it’s a reasonable explanation for the behaviour seen in the Vice article.