7 points

This is the best summary I could come up with:


But a marketing company called CMG Local Solutions sparked panic recently by alluding that it has access to people’s private conversations by tapping into data gathered by the microphones on their phones, TVs, and other personal electronics, as first reported by 404 Media on Thursday.

A November 28 blog post described Active Listening technology as using AI to “detect relevant conversations via smartphones, smart TVs, and other devices.”

This is a world where no pre-purchase murmurs go unanalyzed, and the whispers of consumers become a tool for you to target, retarget, and conquer your local market.

The website previously pointed to CMG uploading past client data into its platform to make “buyer personas.”

The archived version of the page discussed an AI-based analysis of the data and generating an “encrypted evergreen audience list” used to re-target ads on various platforms, including streaming TV and audio, display ads, paid social media, YouTube, Google, and Bing Search.

Before Cox Media Group sent its statement, though, CMG’s claims of collecting data on “casual conversations in real-time,” as its blog stated, were questionable.


The original article contains 711 words, the summary contains 179 words. Saved 75%. I’m a bot and I’m open source!

permalink
report
reply
6 points

I’ve always stood by the position it’s totally possible to snoop audio and match it to a bloom filter or on device least of keywords for ads. Siri is always on so your mic can be always listening and have no impact on the battery life.

In modern mobile OSs it should be clear that your mic is either on or off (to apps) and we don’t see the mic on all the time as would be needed for this. Maybe there’s a hack, but at the scale and being used for commercial services I think someone would have noticed.

permalink
report
reply
5 points
*

Lots of people of Siri disabled entirely. My household included.

permalink
report
parent
reply
6 points
*

I have often wondered if Siri is actually off when I set it to off. It is not as though I am running ps or top as root to check. A bit of a “trusting trust”.

permalink
report
parent
reply
11 points

That’s probably because you have no technical knowledge of voice recognition whatsoever.

permalink
report
parent
reply
1 point

And you aren’t wrong, from page 2 of the article:

Amazon, for example, has previously confirmed that it uses stuff people say (and do) with Alexa for targeted ads (Amazon has long claimed that it doesn’t sell customer data). But our devices are only expected to gather data on what we say when we ask them to listen to us.

permalink
report
parent
reply
1 point
*

At one point Google had highly specialized hardware that only listened for “ok Google”; that’s why you couldn’t (and AFAICT still can’t) change the wake word.

Things may have changed in the years since I learned that, but I suspect recognizing a bunch of words from an ever-changing list would still need to be done in software and require the phone’s CPU to run.

OTOH, the way Android phones recognize and songs for you is very much like what you described, so maybe there really is hardware already that can recognize a shitload of arbitrary sounds using practically no power.

permalink
report
parent
reply
-9 points
*

“guys google assistant isn’t always listening lol it only wakes up on the trigger word. you people know nothing about IT or how good marketers are at guessing” -10,000,000 neckbeards for the last decade, despite everyone’s obvious anecdotal experiences that are just too bullshit to ignore.

Did it really take them admitting it for a publication to talk about it?

Edit: this has angered the neckbeards

permalink
report
reply
1 point
Deleted by creator
permalink
report
parent
reply
6 points

It was the admission that was the news. People know they are being gaslit so when someone finally admits they are gaslighting you you can and should make them pay. Problem with gaslighting is that you don’t have proof, but you know

permalink
report
parent
reply
18 points

the company itself has admitted that their claims were exaggerated.

permalink
report
parent
reply
11 points
*

At the risk of being called a neckbeard:

Before Cox Media Group sent its statement, though, CMG’s claims of collecting data on “casual conversations in real-time,” as its blog stated, were questionable. CMG never explained how our devices would somehow be able to garner the computing and networking power necessary to record and send every conversation spoken within the device’s range in “real-time,” unbeknownst to the device’s owner. The firm also never explained how it acquired the type of access that requires law enforcement to obtain a warrant. This is despite CMG’s blog claiming that with Active Listening, advertisers would be able to know “the second someone in your area is concerned about mold in their closet,” for example.

In other words, they were hyping up capabilities they don’t have.

Are you familiar with Wireshark and network sniffing? Instead of just wondering, why not look for yourself what these devices are sending out? It’s not hard, and it’s not a secret.

I’m not scared of them, because I know exactly how they work and exactly what’s going across my network at all times.

permalink
report
parent
reply
2 points

Is there a way to route traffic from the router to Wireshark? Or would this require a router capable of like OpenWRT?

I have a stupid linksys that has awesome wifi power, but I can’t seem to get custom firmware on it. I might be able to configure it as an access point.

permalink
report
parent
reply
5 points
*

My router is a full on Linux server PC in a rack, so in my case I can just monitor all its interfaces directly on the box. I’ve got an entirely seperate VLAN for my IoT stuff (because a LOT of them are still very unsecure and I’m more scared of my network being compromised that way, by them just getting straight up hacked).

An easy way to do it in your case if you have a gimped ISP-provided router is to find an old hub (not a switch), plug a wireless access point into that, and have the device connect only to that access point. Then plug your laptop or computer into one of the other hub ports and you should be able to listen in on everything being sent across that hub.

More advanced switches might be able to do port-mirroring, which accomplishes the same thing.

permalink
report
parent
reply
3 points

Are you able to dissect the packet contents tho? I can see the raw hex payloads of any packets on my network but that doesn’t really tell me much about the data actually in them

permalink
report
parent
reply
6 points
*

You can at the very least tell when it is and is not transmitting data when you talk around it. You can set up experiments, like having a casual conversation with and without the “wake word” and compare packets. If it starts spewing data every time you talk, or if it remains mostly idle with just occasional DNS lookups or NTP updates and such, you’ll know.

permalink
report
parent
reply
23 points

Just because you don’t understand statistics and metadata analysis doesn’t make it fake. And of course, since it’s real, you can surely point to all the apps whose network traffic was monitored and all the voice data constantly being transmitted that was captured. Because surely in an era where many people pay for data, it’d be impossible to miss the constant audio stream coming from every one of these devices eating up your bandwidth cap.

But nah, “I feel this is true” is all we need. Even when the person who says it, and said it to advertise their product, admits they lied for sales.

Are they tracking you? You bet. If you think they’re so unsophisticated that they need to literally listen to your every word instead of the millions of other data points you FREELY give away already, you just don’t understand the tech and are fear mongering.

permalink
report
parent
reply
4 points

Exactly, their predictive algorithms are entirely too accurate and it’s not just clicking on or searching for products that gives them the information. Even how long it took you to scroll past something is used to analyze potential future behavior and deliver you ads.

You take in so much content everyday that you don’t even realize. They probably saw plenty of them that OP didn’t even realize, I’m sure they gave it away via some other means.

People have tested this before and gotten no additional ads based on their words, it’s all anecdotal.

permalink
report
parent
reply
8 points

You love to see the angry little edit.

permalink
report
parent
reply
8 points

“I got one downvote and a few people sharing facts that dispute my comment. It’s a witch-hunt 😠”

permalink
report
parent
reply
6 points

mUsT bE tHe nEcKbEaRdS

permalink
report
parent
reply
34 points

Good breakdown on this in arstechnica:

https://arstechnica.com/?p=1991469

In a statement emailed to Ars Technica, Cox Media Group said that its advertising tools include “third-party vendor products powered by data sets sourced from users by various social media and other applications then packaged and resold to data servicers.” The statement continues:

Advertising data based on voice and other data is collected by these platforms and devices under the terms and conditions provided by those apps and accepted by their users, and can then be sold to third-party companies and converted into anonymized information for advertisers. This anonymized data then is resold by numerous advertising companies.

The company added that it does not “listen to any conversations or have access to anything beyond a third-party aggregated, anonymized and fully encrypted data set that can be used for ad placement” and “regret[s] any confusion.”

permalink
report
reply
2 points

That last paragraph. I knew they were lying with that headline.

permalink
report
parent
reply
29 points

My sister snd I had a conversation in a terrace about flower seeds to gift my mother. Neither has google assitant or any other voice search app acrivated. We both started getting seed ads. Pretty damning

permalink
report
reply
37 points

Do you know your sister didn’t search for seeds?

permalink
report
parent
reply
18 points

Right. It only takes one opsec breach.

permalink
report
parent
reply
17 points

It’s rather Orwellian to me that this kind of logic counts as justification.

permalink
report
parent
reply
44 points

It’s not justification, it’s about understanding the semantics of what’s technically happening.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 12K

    Posts

  • 554K

    Comments