• @elscallr
    link
    4411 months ago

    Want an honest answer?

    Onboard are >=2 bits of code. At least one of those is a specific system trained to recognize a “wake word”. This specific system (ostensibly) doesn’t send anything to an outside party. Its entire job is to recognize one wake phrase: Alexa, Ok Google, or Siri, and then if that wake phrase is used it responds and tells the second system to listen. As you can imagine, this is a pretty easy job to get right 80% of the time. So that can be put on a chip. So then it does its job, and it’s the second system that sends everything to an internet service for whatever reason.

    • @[email protected]
      link
      fedilink
      2
      edit-2
      11 months ago

      I’d love to have this properly audited sometime. I’d slap like to think that we’re generally protected from big companies doing unethical and unjust things to us, by law, … but nah

      (That’s not to say I don’t believe this explanation; the second half of my comment was just an addendum.)

      • @[email protected]
        link
        fedilink
        -411 months ago

        why is this downvoted? you cant prove its not, if its proprietry. and since the companies listening just happen to profit off data collection (and break/bend the law often), its safe to assume they do this.

        • @[email protected]
          link
          fedilink
          511 months ago

          Because you can prove it by monitoring network requests with a packet sniffer, which has been done.

            • @elscallr
              link
              111 months ago

              It’s a standard tactic for people who do networking things

              • @[email protected]
                link
                fedilink
                111 months ago

                Yeah. I work in that general field but not at the user level like that so never got into packet sniffing. Now’s as good a time as ever eh?

        • @[email protected]
          link
          fedilink
          111 months ago

          Probably bots controlled by people hired by the companies that spy on us through those things.