this post was submitted on 14 Sep 2024
78 points (82.5% liked)

Android

17400 readers
374 users here now

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

πŸ”—Universal Link: [email protected]


πŸ’‘Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.


Support, technical, or app related questions belong in: [email protected]

For fresh communities, lemmy apps, and instance updates: [email protected]

πŸ’¬Matrix Chat

πŸ’¬Telegram channels / chats

πŸ“°Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to [email protected].

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to [email protected].

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities

Lemmy App List

Chat and More


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 4 days ago (4 children)

I do not see why everyone wants to deny this and trust big tech. After you lot completely brainwashed?? Assume the worst, that malicious applications are recording both your microphone and your camera, and do the best you can. Anyone even taking Meta's/Google's side here is absurd to me.

[–] [email protected] 16 points 4 days ago (1 children)

It's not trusting Big Tech, it's understanding that Little Tech can also lie.

Cox Media Group wants to hype up their product and use AI buzzwords. To be seen as reliable they say that they work with Google, Amazon, Facebook, etc.

The report is basically CMG saying they can do X, and everyone else calling bullshit. (And in response CMG clarifying "No, we don't actually do that" and then also removing the companies they don't actually work with.)

It isn't definitively saying they don't, but also isn't saying that they do. You can assume the worst if you like, but that doesn't mean the worst is actually true.

Is it possible this type of spying exists? Yes. Is it possible this is a cover up? Yes. Do we have actual data to support that? No.

Tomorrow an investigation may reveal otherwise, but for now it doesn't seem to be the case.

[–] [email protected] -4 points 4 days ago (1 children)

And because some random report from a third-party who is just as interested in profit said something that matches the worldview of the general masses is out, you're going to believe them?

I don't care what "tech" it is, they are incentivized to lie and you know it. I am still baffled at how absolutely anyone takes the word of corporations to heart

[–] [email protected] 6 points 4 days ago

Yes? I'm forming my opinions based on reporting. You're basing your opinions based on opinions.

Again I'm not saying you're wrong. Look at the information Snowden revealed. Before the reveal it was conspiracy theory. Now it's fact.

This reporting isn't fact, it's reporting in progress. At the moment it doesn't find the always listening allegation to be true, but not impossible either.

[–] [email protected] 3 points 3 days ago

I do not see why everyone wants to deny this and trust big tech.

This is the exact same logic conspiracy theorists use with aliens - "everyone wants to deny they exists and trusts the government, are you guys brainwashed????!!!!!".

Where is your proof this technology exists and is currently being used? The 404 media articles are not proof of either of these things. They are proof that CMG has some marketing slides and a former web page claiming that they have the capability to do this. They are proof that CMG has contacted at least one other company and tried to sell them this alleged service. They are not proof that the technology is being used, or that it even exists.

It's so ironic that you claim we are the brainwashed ones for demanding proof, yet you naively assume that CMG must really have developed this technology and employed it worldwide just because they said so. No one would ever lie about the capabilities of their company to inflate its worth and make more money! Only bad big tech lies, everyone else in the world is 100% honest!

[–] [email protected] 8 points 4 days ago* (last edited 3 days ago)

Because the amount of data use alone would be so astronomical as to be very obvious. Unless it's specifically recording you locally and then uploading that information when you're on wifi (which would be obvious too because of the slow down it would cause, the amount of bandwidth it would take up (making you hit data caps with your provider and throttling your service), and the fact that most phones just do not have that much storage and don't have a slot for added sd cards anymore. Feasibly it doesn't make sense for a handheld device to be recording everything you say passively. Your battery alone would have to last several weeks of normal use.

[–] [email protected] 6 points 4 days ago (1 children)

It's surprisingly easy to use adtech without voice and make a connection to serve a targeted ad. Had a friend ask me about what I was drinking. They were on my guest wifi network. They searched for it. Next day, I'm getting ads because of geoIP pinned my IP address as having an interest.

Also had someone that lives off the grid with no active network or devices watch a DVD of a movie and the entirety of their Internet connectivity was two cell phones in the room. They started seeing things related to the movie. They're older and not constantly on their phones. The phones just sit somewhere in the room.

Had a discussion with some tech friends a few years back and remarked that keeping awake to do this would take a lot of power. The EE mentioned running audio recording would take basically nothing. I expanded from there, the device uploads audio for off-phone translation to text, or queues batch jobs to process locally when power is high enough or on charger. Etc.

It is 100% probable that code runs on phones and just ships off amalgamated text frequency charts or entire conversations and the user won't even notice the battery dent.

That being said, I can't find even in the greediest capitalist money-claw that the person giving a go would not think, "well, I can't trust my own device anymore..." and maybe go: "yeah, I shouldn't do this." Maybe I'm too optimistic though.

[–] [email protected] 0 points 4 days ago (3 children)

How do you think your friend in the woods got the advertisements?

And yes, I still think you're too trusting of Big Tech. They are 100 times more vile than you think they are. THEY WILL do everything they can, and this is nothing to them.

The funny part is nobody wants to believe me and instead want to trust for-profit companies for their supposed pinkie-promises. Oh well, they'll learn in time.

[–] [email protected] 2 points 3 days ago (1 children)

My best guess is that I know one of them uses Facebook. Apple phones. Facebook, Uber, and a few others have had pretty deep access to APIs not accessible to other software companies. Sometimes they're caught like when Uber was caught using a screen scraping API. Sometimes they aren't. The other guess that glues it together is that Facebook has indeed scraped audio to text for a long time. It was almost 10 years ago that I had the EE conversation.

Google and Meta pay Apple money to gain access to their user metrics. It's likely symbiotic relationships. Facebook once had hooks directly in iOS. Likewise, the little mic/video indicators the OS displays when they are "active" are completely software-controlled and can be overridden.

At a time, I worked at a company that had(has) deep access to other aspects of iOS. Apple always required the source code is available to them so they could inspect it. I doubt that has changed. It also means they would be complicit. External tools wouldn't really be able to figure this out. For someone to black-box this they'd need a jailbroken iPhone and some specialized tooling or MITM decryption capabilities.

Not to sound hyperbolic, I'm connecting dots with no evidence, it's pure speculation. The compute seems to be there and with no regulation in source code, anything goes, if you want money bad enough. Especially with the mad dash every tech company has been on for the last 20ish years to harvest everything they can, ever since smartphones became powerful and commonplace enough.

[–] [email protected] 1 points 3 days ago

Exactly. People should read your comment before shouting at me for not providing "proof". They seem incapable to understand that Big Tech can be smarter and more resourceful than a lot of security engineers

[–] [email protected] 1 points 3 days ago

Why would anyone believe you? You have provided zero evidence to support anything you've said here.

[–] [email protected] 2 points 4 days ago

Nobody wants to believe me (a random person on the internet who has provided no proof whatsoever of their own that can be replicated in any way by a credible source, over actual investigative journalists and security experts who have been actively looking for such a thing to validate it and have found nothing after years of these allegations). Hmm. I wonder why that is.