No, they don’t just listen all the time with an open mic and just send all audio to the cloud. Anyone in cybersecurity would definitely notice that and sound the alarm.
How would they though? The mic is already known to be always on, and what the servers/back-end are doing with the mic input data is not viewable/known by us. So how would they know?
TimeSquirrel@kbin.social 6 months ago
If you're monitoring the traffic, and you start speaking, and you suddenly see pac6kers spewing out of a device every time you talk, that's a good indication. There's indirect methods to analyze it without necessarily being able to see the actual data.
Poking around the PCB with an oscilloscope to see electrical signals will probably be useful too.
CosmicCleric@lemmy.world 6 months ago
Its already established that the mic always hot, and that data is always being sent to the sever.
What they do with the data is not seeable by us. That is the point being discussed, do they listen in to non-initiate conversations and market off of that data to us.
~Anti~ ~Commercial-AI~ ~license~
TimeSquirrel@kbin.social 6 months ago
Tell me, how have you established this? What were your methods?
CosmicCleric@lemmy.world 6 months ago
By calling out for the Google assist, without having pushed any button first. It’s always listening for the initiate key phrase.
~Anti~ ~Commercial-AI~ ~license~