• 1 Post
  • 11 Comments
Joined 6 months ago
cake
Cake day: July 5th, 2024

help-circle



  • It’s well possible and previously tv mic had been used as bugging device. The problem is, way too many security researchers look in system level software of iOS and even other components of the device that such practice will be too risky for apple (same applies for mainstream android products). Also processing realtime audio, finding potentially unrealiable topic from it and doing realtime ad is actually too much work as of today’s tech (might change sooner than you think though).

    What, I think, is more practical is to use the whole query after the wake word to show ad, and potentially use other app tracking data, which is way much reliable than voice for targeting purpose. Voice data is useful for bugging purpose, primarily (ab)used by nation states and LE.

    I bet in the medical procedure case mentioned in the blog the user searched/talked about that in other apps and average people aren’t good to notice these privacy leaks.


  • I’m not talking about AI in general here. I know some form of AI has been out there for ages and ML definitely has some field specific usecases. Here the objective is to discuss the feeling about gen AI produced content in contrast to human made content, potentially pondering the hypothetical scenario that the gen AI infrastructure is used ethically. I hope the notion of generative AI is sort of clear, but it includes LLMs, photo (not computer vision) and audio generators and any multimodal combination of these.






  • Yes that is absolutely annoying and I hardly use such online services other than those I have to like bank, any government services, package delivery/ridebooking etc where in app call doesn’t exist and calling is necessary sometimes and some healthcare.

    Sometimes they do it to reduce throwaway/inactive accounts as (npn voip) phone numbers are harder to get at scale than email ids. But ironically, some countries have law requiring them to keep the logs so it might be used to connect identity against one’s will, say, by law enforcement.



  • Whatever you put on public domain without explicit license, it becomes CC-0 equivalent. So while it feels violating, it’s perfectly fine. The best opsec should be separating your digital identities and also your physical life if you don’t want it to be aggregated in the same way. These technologies (scraping) have been around for a while and along with llm’s will stay for quite sometime in future, there’s no way around them.

    PS: you, here, is generic you, not referring to OP.