• dv48@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    29 minutes ago

    I thought Android has a non bypassable green dot in the notification bar when the micro is on ?

  • JATth@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 hours ago

    This might just push my fear of targeted ads enough to give in to my idea of a nearly soundproof box for my phone when I’m not using it. :(

    • FMT99@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      Just install an OS that allows per-app microphone permissions. I’m running LineageOS and I can tell it for example to only allow Whatsapp mic access when I actively open the app. Actually according to the article, the same can be done on plain Android too.

  • Alpha71@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 hours ago

    Beer pong

    Yeah that sounds like an app user who would be okay with his audio being recorded…

  • kepix@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    3 hours ago

    yeah, alphonso appeared on my mibox, eset called it a trojan right after the update. had to delete it through adb, cause its a “system app”

    • iknowitwheniseeit@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      2 hours ago

      Reading this made me wonder if I was having a stroke, because it seems like English but I don’t recognize so many of the words. 👴

  • WalnutLum@lemmy.ml
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    3
    ·
    12 hours ago

    I used to work for a mobile advertiser, and we installed hella bloatware on phones.

    This idea was floated a couple times but was deemed not very effective cause you’d have to store and process hours and hours of audio data that didn’t tell us much more than just having a week or so of GPS data, your Facebook profile, and your phone IMEI.

    It’s pretty easy to see if you’re near a Popeyes and what other IMEIs are connecting to the same tower, extrapolate that to you being near your wife and you and your wife thinking about shit on the Popeyes menu.

    Boom targeted ad/video for fried chicken.

    The rest is general tech paranoia leading to Apophenia.

    There’s no microphones or cameras, it’s just the already gigantic mountain of data anyone who uses a smartphone is constantly broadcasting getting ground through the big data machine that has been the pillar of all tech since the last recession.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      4
      ·
      edit-2
      12 hours ago

      you’d have to store and process hours and hours of audio data that didn’t tell us much

      I mean that could be solved as simply as a local transcription service…

      • WalnutLum@lemmy.ml
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        2
        ·
        edit-2
        12 hours ago

        And do what? Sentiment analysis on the conversation you were having?

        Remember semantically aware models are still fairly new and even they lack the context for a particular field of text. That’s something even the new fancy LLMs struggle with.

        Unnecessary when there’s way better targeted models trained on years of data that people willingly send as part of everyday smartphone use.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          4
          ·
          12 hours ago

          Sentiment analysis on the conversation you were having?

          Among other things, sure. More simply, keyword analysis.

          Remember semantically aware models are still fairly new and even they lack the context for a particular field of text.

          All of these “models” are useless garbage but it doesn’t stop them from trying to absolutely cram them everywhere they can.

          Unnecessary

          None of what they do is “necessary”. They could just ask you what your relevant interests are and you could tell them, but they do it anyway. They go to great lengths for any seemingly insignificant amount of data they can get their hands on.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      12 hours ago

      But wouldnt it be a moot point if I restrict access to GPS for all apps?
      How much of that data is from Google/Apple (e.g. Google Maps)?

      • WalnutLum@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        3
        ·
        12 hours ago

        If you use android google grabs your GPS data regardless, you have to root and disable it.

        Apple does the same thing but they didn’t have their pants occupied by third-party network’s fingers like google did until the pixel came out.

        Google maps is basically a beacon for AdMob to target you nearly perfectly.

        Also using “fine location” in any app grabs the nearby wifi list and sends it to Google/apple if it’s not cached.

        Also most ad providers these days have made deals with major networks that let them tell what tower your IMEI pinged off of.

        It’s why google tried to push android/ad IDs, way less info for the networks to advertise over, and it also put the tracking in their hands instead.

  • elucubra@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    14
    ·
    11 hours ago

    Right around the confinement my sister and I were talking about getting some seeds for my mom. Neither of us searched for seeds. From that point we both started to get ads for seeds, many for the ones we had talked about in particular. This thing was so unequivocal that it proved to me that our phones listen. Maybe they don’t analyze, but they definitely listen for words actionable for an advertising purposes.

    • WildPalmTree@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 hours ago

      More likely, your late’ish habits and searches combined with age and another mountain of data correlated with people that have the same thought. We are no snowflakes.

      Edit: I should say, if this example is true. I’m not saying you are lying, just that if you are, it’s not a “gotcha”. This thread is making me paranoid! :)

    • TankovayaDiviziya@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      11 hours ago

      That’s why i always forbid access to my microphones by apps. Many AI apps will also remember what you discussed long ago.

  • Psythik@lemm.ee
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    edit-2
    17 hours ago

    Use NextDNS with strong filters and the DDG app with App Tracking Protection turned on. While no filter is 100% perfect, this combo stops the vast majority of privacy-invading shit from getting to 3rd parties.

    • masterofn001@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      14 hours ago

      I use shizuku for hidden api/shell access…the devs of that have an app called appops which, you guessed it, allow you to change any appops permission for any app. Allows denying/ignoring clipboard access, device identifiers, location, microphone, etc.

      appops screenshots

      :::

      • dev_null@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        ·
        11 hours ago

        Comments like this try to make you give up on privacy by making it look like all is lost from the get to.

        They are lying, don’t believe them, there is a lot you can do to protect your privacy.

      • Ulrich@feddit.org
        link
        fedilink
        English
        arrow-up
        6
        ·
        12 hours ago

        Both of these apps have device-level notifications to let you know when an app is listening. I promise they’re not. There was a service a while back that was claiming this in their advertising and it went public and their partners all scattered like flies. No one wants to be associated with that sort of thing. It’s unnecessary anyway.

  • viking@infosec.pub
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    2
    ·
    18 hours ago

    And people wonder why I keep rooting my Android phones.

    Without advanced permission denial and file access restrictions, phones will spy on anything and anyone.

    • dev_null@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 hours ago

      That helps with other dangers, but in this case all you need to do is not give “Pool 3D” access to the microphone, no rooting required.

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      6
      arrow-down
      11
      ·
      18 hours ago

      Rooting is no longer required and is a security risk

      Or do you mean flashing custom privacy respecting rom

      • viking@infosec.pub
        link
        fedilink
        English
        arrow-up
        19
        arrow-down
        1
        ·
        edit-2
        17 hours ago

        No, I exactly mean rooting, and it is a hard requirement for me when choosing phones.

        If you know what you’re doing, there is no security risk involved, since every app requesting for root access needs to be granted individually, and you can opt to do so for a limited time or permanently. Or not grant it at all, obviously.

        Tools like AppOps (advanced permission management), Storage Isolation (prevent access to certain folders even if “file access” permission is granted to some app), Ice Box (keep certain apps in a permanent state of hibernation unless you explicitly launch them) are absolute core essentials.

        Other apps that enable you to fully remove system apps, system level adblockers, VPN sharing etc. might be optional, and there are no-root workarounds, but they all come with serious limitations.

        • Rolivers@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 hours ago

          Hmm… Do you use a different root method than magisk? I don’t think a root method based on the efforts of a single developer is a safe practice.

          • viking@infosec.pub
            link
            fedilink
            English
            arrow-up
            2
            ·
            9 hours ago

            There are other tools, but their developers aren’t publicly known. So I indeed trust into the one man show that is magisk, at least as a full time Google employee who gets his codebase reviewed in-house, there’s some more trust than to a random nobody. And he does publish the code and allows for user contributed fixes on github.

            • SpongyAneurism@lemmy.frozeninferno.xyz
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 hours ago

              Little nitpick: Graphene OS isn’t artificially restricted to Google phones. Pixel phones just happen to be the only ones that fulfill the safety requiremets that Graphene OS wants.

              Other manufacturers could do the same and Graphene OS devs would welcome it, they just choose not to do that.

      • dai@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        18 hours ago

        Granting blanket root to all programs on an android phone sure that’s a risk; but who the fuck does that on any system…

        From memory individual apps would be able to request root which could be denied, approved once, approved always or ignored.

  • solrize@lemmy.world
    link
    fedilink
    English
    arrow-up
    161
    arrow-down
    1
    ·
    1 day ago

    Article is from 2018. Someone must have pasted the url from hacker news where the same story was dug up recently.

    • nalinna@lemmy.world
      link
      fedilink
      English
      arrow-up
      31
      arrow-down
      1
      ·
      1 day ago

      Is that to say that it’s no longer valid? Or just that it’s old news? The list of apps associated with the software is still pretty extensive; Google Assistant even showed up.

      • Kecessa@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        29
        ·
        edit-2
        1 day ago

        Well these days Android asks for more permissions so I guess it would prevent it in many cases by preventing access to the microphone for apps where you don’t want to allow it…

        • Phoenixz@lemmy.ca
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          3
          ·
          23 hours ago

          Yeah, most people just click beyond that in a millisecond because it’s just an an annoyance between them and the needed dopamine.

          I think app stores can do a whole lot more, especially with he insane amounts of money they’re earning from it (hello and fuck you, apple). They can make microphone access a special privilege that requires the developer to make a special request that gets verified on the app store before the app can be released, for example

          • chiliedogg@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            17 hours ago

            I think a middle ground may be having that requirement for background mic usage, or usage without a specific user prompt that turns on a mic.

            Lots of apps have legitimate use for the mic. Apps having legitimate use for the mic while you’re not actively using the app on screen are more limited and need stricter permissions.

            I’d also like to have a hardware mic mute switch that physically disconnects the mic, so I can just keep it off unless I want it like I do with the mic and Webcam on my computer.

      • thangcuoi@lemm.ee
        link
        fedilink
        English
        arrow-up
        26
        arrow-down
        1
        ·
        1 day ago

        7 years is a long time in tech.

        Google Assistant is supposed to listen for the “Hey Google” trigger word. How else do you expect to use your device hand-free.

        • Psychadelligoat@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          12 hours ago

          It also does it completely locally, using an on-device chip. If your phone has the Google assistant on it, disable all Internet and try the wake phrase, it’ll work. Nothing else does, because it has to phone home for that, but the wake phrase handling IS on-device. Can’t even turn the flashlight on otherwise tho lol, even if you use what we used to call the power button (new name for it? Lock button?) and type what you want it bitches about internet

  • Auli@lemmy.ca
    link
    fedilink
    English
    arrow-up
    75
    arrow-down
    2
    ·
    edit-2
    1 day ago

    Wasn’t there just a storey a couple days ago that apps where not doing this but taking screenshots and videos on the screen and sending that. And both iOS and Android have the microphone notification now.

      • dev_null@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 hours ago

        This link proves how robust the security research is and how quickly bugs like that are patched.

      • chaospatterns@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        17 hours ago

        Past vulnerabilities doesn’t mean there is active mpdern vulnerabilities especially ones in widely tested operating systems that’s exploited by as many apps as people claim are listening when security researchers also regularly reverse engineer and analyze the source code of popular apps to figure out what they’re doing. You can decompile Android apps pretty easily to see what they’re doing. Some are obfuscated so it takes some effort.

        Its one thing to claim there’s some a system level bypass for the icon that the NSA uses to spy on its enemies, it’s another thing to claim that it’s being exploited on a wide scale by a tech companies on different apps, iOS and Android, multiple versions/devices.

        The reality is that we leak tons of info through other mediums that are easier and cheaper to collect than through microphones.

    • Basic Glitch@lemm.ee
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      1 day ago

      I know I’m usually on the more paranoid side, but I’ve always assumed everything I do on a smartphone is potentially being monitored via camera or mics.

      If the apps are just taking screenshots, or recording a few seconds of data via mic, it would be almost guaranteed that certain corrupt (and also paranoid) governments that are dismissive of privacy rights could force or bribe those apps to allow them to also access screens, mics, and cameras anyway, right?

      I’m in the U.S., and especially with how glitchy my phone has suddenly become over the last few months, I’m just at the point where I just assume that’s what’s going on.

      I had the same android for like 4 years without many issues, then suddenly around February it just became almost impossible to use. Weird glitchy things with the size of the tool bar at the bottom of my screen and the popup keyboard. Redirect notifications all the time for certain websites, and my VPN connection is just constantly interrupted and having to be reset.

      I finally was like fuck it, this is an old phone so maybe that’s it. Brand new phone, but most of the same issues.

      I use signal instead of text most of the time, and switched a lot of things to proton mail, but if someone is potentially recording your screen, does it really matter if what you’re doing is encrypted?

    • acosmichippo@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      6
      ·
      edit-2
      1 day ago

      i used to think this as well (i have never used any facebook apps), but last night something happened that made me question it.

      My wife and i were going through a chipotlane that was right next to a Popeye’s. As we were waiting i looked over to popeyes and saw some posters for their new pickle chicken stuff and asked my wife “the fuck is a pickle ‘glaze’?”

      she said “i have no idea but i kinda want some fried pickles now.”

      literally a few seconds later she opens instagram on her phone and is shown a video of a person making pickle brined chicken.

      yes yes it could be a coincidence, but i am a lot less certain of that now.

      • slumberlust@lemmy.world
        link
        fedilink
        English
        arrow-up
        16
        ·
        21 hours ago

        The way I’ve heard it is that it’s not just coincidence nor microphone scanning, but just the effectiveness of targeted ads in general. You could be within wifi range of other users who are searching for pickle stuff or you yourselves have a history of pickle purchases, etc. This stuff is scary specific already.

  • Mediocre_Bard@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    2
    ·
    1 day ago

    I keep my phone in a chip bag and only pull it out to LARP the preparation for the assassination Franz Ferdinand in general terms without naming actual places or names.

  • Korne127@lemmy.world
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    3
    ·
    1 day ago

    But… they can’t access the microphone without the user explicitly allowing

    • SuiXi3D@fedia.io
      link
      fedilink
      arrow-up
      29
      arrow-down
      17
      ·
      1 day ago

      Tell that to Facebook. Shit, I’ll talk about something with my wife and see ads about it ten minutes later. Been happening for years.

      • Miles O'Brien@startrek.website
        link
        fedilink
        English
        arrow-up
        34
        arrow-down
        8
        ·
        1 day ago

        I tested this with my Facebook app in 2013. Found a Spanish radio station, set my phone down next to it overnight, and for several weeks I was seeing ads exclusively in Spanish. Deleted the app the first day I saw them in Spanish, and deleted my account not long after that.

        My wife still uses them after 5 years together and me pointing out all the times it’s obviously eavesdropping on us, and she’s even been creeped out by it before. Still uses it…

        Unless my microphone and camera have physical switches, I will assume they are being used. Those little “your camera and microphone are off” icons in the corner of the screen don’t reassure me.

        • muusemuuse@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          2
          ·
          edit-2
          22 hours ago

          This has been tested and proven time and time again. Google and Apple give apps a method to access the mic that the OS can allow or deny. This is what the apps are supposed to use.

          Facebook doesn’t use that method for passive monitoring, only for active engagement. Don’t looks like it’s working when you go the use the thing and it’s disabled but it’s still listening to you.

          If you must use such a social network, never ever ever use the mobile app. Use the website or don’t use the service at all.

        • thangcuoi@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          17 hours ago

          Did you receive the Spanish radio signal over the traditional airwaves or streaming. Was it a digital radio, as those can also be tracked.

      • Clairvoidance@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        1
        ·
        edit-2
        1 day ago

        That’s monitoring you and your closests’ other behavior, as well as monitoring then nudging you towards wanting certain things. The ad itself is the last nudge in that chain that tries to go “you wanted this, don’t you?” after all of the other thinking it’s making a case for your life being better with it.

        • GreenKnight23@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          18 hours ago

          my wife and I had been married for 2 years. been together for close to 10.

          not once did we EVER say “Adirondack Chair”. Just never came up in conversation. we were broke as fuck and couldn’t afford something as superfluous as one of those.

          One day, were driving down the road home and see one on the side of he road.

          what’s that?

          looks like an Adirondack Chair

          Adirondack Chair? For free?

          yeah, it looks broken though.

          we get home go inside. I sit down to veg on my phone on the sofa. what does Amazon put in my “things you like” feed? mother fuckin Adirondack Chairs. Google news feeds? Adirondack Chairs on sale.

          My wife had YouTube videos that were reviewing Adirondack Chairs.

          this was ten years ago. Imagine what they’re doing now…

          • Clairvoidance@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            6
            ·
            edit-2
            12 hours ago

            This is stuff they could’ve gotten from location-data, or if your wifi was on, as you drive through different peoples’ wifi connections (both seeing where you’ve been, and hooking the data from you into data of people in your area to form connections of what’s trending and what they can get you to think about)

            I’m not saying they’re not mass-surveilling in the most efficient ways they can, but hot-mic while sounding frightening, is the least useful tool ever for their means, and as has already been mentioned in this thread, android auto locks out that permission now anyway, making this a bad focus in the sense that it is not over just cause they can’t get to your microphone.

      • thangcuoi@lemm.ee
        link
        fedilink
        English
        arrow-up
        21
        arrow-down
        5
        ·
        edit-2
        1 day ago

        It’s more likely that your wife or someone nearby was further researching the same topic you were talking about.

        Facebook and other ad companies use your location, relationships, and other data they already had on you to serve you relevant ads.

        At this stage, they know more about you than the government, or your wife.

        • thejml@lemm.ee
          link
          fedilink
          English
          arrow-up
          19
          ·
          1 day ago

          I’ve read about this phenomenon in the past. Generally it’s found that due to audio processing cost and the sheer amount of other data easily gathered, there’s no reason for them to snoop with your microphone because other data is so readily available, much easier to process, store and ship.

          • 0oWow@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            21 hours ago

            I read about that recently as well. There is a problem though. Your phone can turn your voice into text instantly. It’s a feature built in to your keyboard. They could turn the audio into text and then transmit the text only. Saves much data that way.

          • Euphoma@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            2
            ·
            1 day ago

            Honestly these days they could process the audio on your phone with a small audio classification machine learning model, although nowadays phone os’s show if the mic is in use

        • Dead_or_Alive@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          10
          ·
          1 day ago

          Bullshit. The amount of times I’ve had random conversations about odd topics for the very first time with my wife and the fucking subject appears in a FB add three hours later.

          Nope, go peddle your corpo propaganda elsewhere.

    • Arcane2077@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      27
      ·
      edit-2
      1 day ago

      Only on iOS. Also a lot of apps can present valid uses for microphone access, which prompts users to allow unlimited malicious use

      • pHr34kY@lemmy.world
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        4
        ·
        1 day ago

        I can be absolutely certain no apps can access my mic in the background. Even when in the foreground, there is a hot-mic indicator.

        • BossDj@lemm.ee
          link
          fedilink
          English
          arrow-up
          15
          arrow-down
          1
          ·
          1 day ago

          Here’s the misleading part:

          Tap on one of those “while in use” apps. You’ll see there is no option “allowed all the time.” It doesn’t exist.

          “while in use” is top level, and changes to “while using the app” when you actually look at the permission. They really mean when the app is running. And many often run in the background.

          • sunzu2@thebrainbin.org
            link
            fedilink
            arrow-up
            1
            ·
            21 hours ago

            Theoretically if mic gets accessed it should be lighting the indicator. Not sure if that’s how it actually works though.

      • prole@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        edit-2
        1 day ago

        Not only on iOS. I use Android and my microphone is always off unless I allow a specific app to use it, and even then, I have the option of only allowing it for that one time. Including the phone app.

        Mic and camera are always off.

          • prole@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            1
            ·
            edit-2
            1 day ago

            A little pop up comes up saying something about “getting the most out of your phone” with the option to turn the mic on for the app that’s requesting it (phone app). Only turns on for the call. Just gotta tap the screen once.

            I keep the mic and camera options at the top of my quick-… whatever they call them… options, so if I need either one for something else, it’s super easy to turn off/on.

            Android shows a little green logo in the top right if the mic and/or camera is on as well. So if I ever do enable them, it’s easy to remember to turn them off again.

              • prole@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 day ago

                It works great for me. I’m using a Pixel with stock Android, so I can only speak to how it behaves on my phone. I know sometimes carriers add/change shit.

      • stebator@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        1 day ago

        Because it is software-based access control, it is impossible to guarantee that access really has been disabled. Thanks to Apple’s design, we now live in a world where users are not supposed to detach batteries or physically turn off microphones and cameras; it’s all software-controlled. The problem is that software can be hacked and have backdoors. Also, thanks to Apple’s smart design, users can no longer upgrade the memory sticks on their Mac Minis and MacBooks. Why do I say it is all Apple’s fault? Unfortunately, other manufacturers copy these design ideas…