Onboard are >=2 bits of code. At least one of those is a specific system trained to recognize a “wake word”. This specific system (ostensibly) doesn’t send anything to an outside party. Its entire job is to recognize one wake phrase: Alexa, Ok Google, or Siri, and then if that wake phrase is used it responds and tells the second system to listen. As you can imagine, this is a pretty easy job to get right 80% of the time. So that can be put on a chip. So then it does its job, and it’s the second system that sends everything to an internet service for whatever reason.
why is this downvoted? you cant prove its not, if its proprietry. and since the companies listening just happen to profit off data collection (and break/bend the law often), its safe to assume they do this.
I’d love to have this properly audited sometime. I’d slap like to think that we’re generally protected from big companies doing unethical and unjust things to us, by law, … but nah
(That’s not to say I don’t believe this explanation; the second half of my comment was just an addendum.)
Want an honest answer?
Onboard are >=2 bits of code. At least one of those is a specific system trained to recognize a “wake word”. This specific system (ostensibly) doesn’t send anything to an outside party. Its entire job is to recognize one wake phrase: Alexa, Ok Google, or Siri, and then if that wake phrase is used it responds and tells the second system to listen. As you can imagine, this is a pretty easy job to get right 80% of the time. So that can be put on a chip. So then it does its job, and it’s the second system that sends everything to an internet service for whatever reason.
I didn’t ask for honesty!
Nah, they’re always listening, what you described is just a placebo button.
why is this downvoted? you cant prove its not, if its proprietry. and since the companies listening just happen to profit off data collection (and break/bend the law often), its safe to assume they do this.
Because you can prove it by monitoring network requests with a packet sniffer, which has been done.
Interesting. I haven’t seen this myself but it wouldn’t really surprise me.
It’s a standard tactic for people who do networking things
Yeah. I work in that general field but not at the user level like that so never got into packet sniffing. Now’s as good a time as ever eh?
Probably bots controlled by people hired by the companies that spy on us through those things.
I’d love to have this properly audited sometime. I’d slap like to think that we’re generally protected from big companies doing unethical and unjust things to us, by law, … but nah
(That’s not to say I don’t believe this explanation; the second half of my comment was just an addendum.)