this post was submitted on 16 Dec 2023
344 points (98.3% liked)

Technology

59607 readers
3431 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] TimeSquirrel@kbin.social 12 points 11 months ago* (last edited 11 months ago) (2 children)

At the risk of being called a neckbeard:

Before Cox Media Group sent its statement, though, CMG's claims of collecting data on "casual conversations in real-time," as its blog stated, were questionable. CMG never explained how our devices would somehow be able to garner the computing and networking power necessary to record and send every conversation spoken within the device's range in "real-time," unbeknownst to the device's owner. The firm also never explained how it acquired the type of access that requires law enforcement to obtain a warrant. This is despite CMG's blog claiming that with Active Listening, advertisers would be able to know "the second someone in your area is concerned about mold in their closet," for example.

In other words, they were hyping up capabilities they don't have.

Are you familiar with Wireshark and network sniffing? Instead of just wondering, why not look for yourself what these devices are sending out? It's not hard, and it's not a secret.

I'm not scared of them, because I know exactly how they work and exactly what's going across my network at all times.

[–] currycourier@lemmy.world 3 points 11 months ago (1 children)

Are you able to dissect the packet contents tho? I can see the raw hex payloads of any packets on my network but that doesn't really tell me much about the data actually in them

[–] TimeSquirrel@kbin.social 6 points 11 months ago* (last edited 11 months ago)

You can at the very least tell when it is and is not transmitting data when you talk around it. You can set up experiments, like having a casual conversation with and without the "wake word" and compare packets. If it starts spewing data every time you talk, or if it remains mostly idle with just occasional DNS lookups or NTP updates and such, you'll know.

[–] peopleproblems@lemmy.world 2 points 11 months ago (1 children)

Is there a way to route traffic from the router to Wireshark? Or would this require a router capable of like OpenWRT?

I have a stupid linksys that has awesome wifi power, but I can't seem to get custom firmware on it. I might be able to configure it as an access point.

[–] TimeSquirrel@kbin.social 5 points 11 months ago* (last edited 11 months ago) (1 children)

My router is a full on Linux server PC in a rack, so in my case I can just monitor all its interfaces directly on the box. I've got an entirely seperate VLAN for my IoT stuff (because a LOT of them are still very unsecure and I'm more scared of my network being compromised that way, by them just getting straight up hacked).

An easy way to do it in your case if you have a gimped ISP-provided router is to find an old hub (not a switch), plug a wireless access point into that, and have the device connect only to that access point. Then plug your laptop or computer into one of the other hub ports and you should be able to listen in on everything being sent across that hub.

More advanced switches might be able to do port-mirroring, which accomplishes the same thing.

[–] peopleproblems@lemmy.world 1 points 11 months ago

Haha I have of those thanks.