this post was submitted on 14 Sep 2024
77 points (82.4% liked)

Android

17626 readers
336 users here now

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

πŸ”—Universal Link: !android@lemdro.id


πŸ’‘Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.


Support, technical, or app related questions belong in: !askandroid@lemdro.id

For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id

πŸ’¬Matrix Chat

πŸ’¬Telegram channels / chats

πŸ“°Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities

Lemmy App List

Chat and More


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] bdonvr@thelemmy.club 30 points 1 month ago* (last edited 1 month ago) (3 children)

Someone back this up with proof. Security researchers would've noticed this. They'd've had to have hacked their way around the microphone permission systems and microphone use indicator (depending on OS) on your phone and upload that data without being caught by security analysts. That kind of bug would probably be worth a fairly decent bounty too.

The article talks about a slide in a PITCH to advertisers. But not a concrete system. Then it goes on to say advertisers bought a dataset from other sources. What dataset? From where? It doesn't say. Transcriptions from voice assistants? Maybe. But without hard evidence I don't believe random apps are just recording clandestinely in the background. But people want to believe this so writing shitty unsourced articles with click bait titles and tenuous-if-I'm-generous linking of weak facts lacking entirely in context generates lots of clicks.

[–] MajorHavoc@programming.dev 5 points 1 month ago (1 children)

Security researchers would've noticed this.

They did notice. Malicious apps that use everything they can to spy on you are old news.

To your point - this isn't confirmation that any of the big players are listening directly. That would probably have been caught by security researchers, although it would be really difficult in Google's or Amazon's case, as they run proprietary software at a very low level.

The news here is two fold;

  1. Cox got caught buying that data, and when confronted about it, Google, Amazon, and Meta all failed to deny that they also buy that data from those malicious app makers.

  2. This is strong evidence that someone is routinely collecting that data. That's news. We've suspected for awhile that, at minimum, the malware apps do. Occam's razor says at minimum, we should now assume many malware apps are using microphone to collect speech and submit it elsewhere for analysis.

The unprovable part of this that smells much worse is: a kid in a basement writing malware does not have the computing power to turn tons of raw voice recordings into useful correlated data.

That kid needs an ally with a lot of computing power. Google, Meta, and Amazon all have a motive here and have the necessary computing power.

And all three worded their denials pretty carefully, I noticed.

[–] bdonvr@thelemmy.club 5 points 1 month ago (1 children)

Cox got caught buying that data, and when confronted about it, Google, Amazon, and Meta all failed to deny that they also buy that data from those malicious app makers

But what is that based on? This paragraph?

A spokesperson for CMG told Newsweek that "CMG businesses have never listened to any conversations nor had access to anything beyond third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement."

I don't think that explicitly means they had datasets made up of clandestinely recorded conversations in the wild.

third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.

Really could describe ANY possible set of tracking data... Unless you put this quote into a clickbaitey article and strongly imply it's something sinister.

[–] MajorHavoc@programming.dev 3 points 1 month ago* (last edited 1 month ago)

You're not wrong to give the benefit out the doubt and believe their PR person isn't lying.

But I'm not inclined to give that benefit of the doubt. I don't trust these folks farther than I can throw them. I don't, myself, need proof, to believe they would try this crap.

And this is definitely evidence.

[–] lemmyvore@feddit.nl -5 points 1 month ago (1 children)

What bug? It's super easy to do this in an app that already has access to your microphone, like Whatsapp, then extract only keywords from conversations and send them to Meta packed as innocuous numeric codes piggybacking on the overhead of encrypted connections.

A single byte here and there is all you need to know people were talking about cats, or perfume, or shoes etc.

Whatsapp protocol, app and servers are closed source, and Meta apps will download and compile native code upon installation, which escapes normal JVM restrictions and does God knows what.

On certain brands of phones (like Samsung) Meta apps come with a manufacturer-preinstalled system stub that can do pretty much whatever it wants, but is typically used to elevate the rights of Meta apps that were installed via normal means and to collect information from them as well as any app that's running ads from Meta.

And this is a company that's a third party to the Android ecosystem β€” it's a lot easier for Google themselves, who are datamining the shit out of everything you do on a phone, from second-by-second location to email. And Meta is datamining the shit out of absolutely everything you put on Facebook and Instagram, in spite of any fines and sanctions. And Microsoft are datamining the shit out of everything you do on your PC and they're openly pushing Recall and Copilot and have been pushing Cortana for so long.

What do you think Cortana and OK Google were listening for?.Hell, Amazon and Google were both caught storing recordings of people's conversations in the beginning, before they started hiding it better.

So you're being watched in every way possible in every single thing you do that touches any technology from these companies, we have countless documented instances of them breaking privacy in heinous ways like giving up people to authoritarian governments and to anti-abortion governments in the US and so on...

...and you're seriously wondering if they're snooping on your conversations? They have every means at their disposal, they're using it every second, and you're wondering if they're doing that too?

Why wouldn't they? It's obvious that we live in a world where it's ok to ask forgiveness (and you'll get a slap on the wrist, if that) rather than permission. What would possibly compel them to not do it?

Consequences? What consequences? We already know for a fact they spy on so much stuff and we keep using their tech. There are no consequences.

[–] bdonvr@thelemmy.club 13 points 1 month ago (1 children)

I'm not interested in conjecture I'm interested in facts. Get me some research papers. Get me some court docs. Something.

[–] catloaf@lemm.ee 11 points 1 month ago* (last edited 1 month ago)

Even a tweet from a security professional with a screenshot of Wireshark would be nice for a start.