this post was submitted on 12 Nov 2023
1481 points (96.1% liked)

tumblr

3480 readers
2 users here now

Welcome to /c/tumblr, a place for all your tumblr screenshots and news.

Our Rules:

  1. Keep it civil. We're all people here. Be respectful to one another.

  2. No sexism, racism, homophobia, transphobia or any other flavor of bigotry. I should not need to explain this one.

  3. Must be tumblr related. This one is kind of a given.

  4. Try not to repost anything posted within the past month. Beyond that, go for it. Not everyone is on every site all the time.

  5. No unnecessary negativity. Just because you don't like a thing doesn't mean that you need to spend the entire comment section complaining about said thing. Just downvote and move on.


Sister Communities:

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -5 points 1 year ago (2 children)

Jesus Christ "always listing".

No they aren't. Not in any sense that even explained in common sense language to normal people.

They are listening to what amounts to be a key pair(s) voice imprint. That's done at a hardware level. And despite it be career making and be worth millions nobody has reported any large scale beach of trust in many years.

The major players have an excellent track record of being secure.

[–] [email protected] 3 points 1 year ago

The major players have an excellent track record of being secure.

Facebook doesn't.

[–] [email protected] 1 points 1 year ago (1 children)
[–] [email protected] 1 points 1 year ago (1 children)

Whatever you say. Still not a single person who can list consumer devices using this tech.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

Whatever you say astroturfer.

But it does not look like like they are secure at all

Hey, we even have leaks... .

Tell your boss to update your script

[–] [email protected] 0 points 1 year ago* (last edited 1 year ago) (1 children)

First, the attacker needs to be within wireless proximity of the device, and listen to MAC addresses with prefixes associated with Google. After that, they can send deauth packets, to disconnect the device from the network and trigger the setup mode. In the setup mode, they request device info, and use that information to link their account to the device and - voila! - they can now spy on the device owners over the internet, and can move away from the WiFi.

Congrats, you found a single instance. It was patched via the security program. It relied on physical proximity.

Then you link another scenario where an utterly insignificant portion of users data was shared with partners.

It's grasping at straws and both those incidents are unrelated to always on recording. None of that shit you linked is related in the least bit. It's slippery slope bullshit you're trying to pull.

Astroturfing 🤣🤣🤣 good lord I wish I could get paid arguing with uninformed privacy zealots.

[–] [email protected] 1 points 1 year ago (1 children)

So much so for your "excellent track record of being secure." right? Specially this taking almost a year to be patched. Now image the exploits that were found not by researchers, but malicious parts...

I mean, if you were a paid astroturfer I could understand, because people have to make ends meet right. But doing that for free? What a dystopian world we live in

[–] [email protected] 0 points 1 year ago* (last edited 1 year ago)

Holy shit, you really are stuck on this 100% unrelated local access hack 🤣

I guess you'll never use tls again cause of its history right?