Hacker Newsnew | past | comments | ask | show | jobs | submit | spobin's commentslogin

I've been making a VR piano app to help with my own practicing. I find that it helps to see the recorded hands moving in 3d space in front of you. I can also slow down the movements to make it easier to replicate. It's certainly easier than learning sheet music! Here's a video if anyone is interested: https://www.youtube.com/watch?v=tnBmjtgb2rA


You may have meant 'domain' as in an area of interest, in which case this is good advice. For years though, I was a proponent of the 'buy a domain name first' method of idea validation. As a result I spent far too much time and money on domain names when I should have been testing the idea/market.


A very good point. Still, it's raising awareness and is worthwhile as a project.

As you say, hopefully Wikimedia will take note and implement a darknet version themselves.


Surely it's possible to sniff what's being sent back to Amazon's servers? If Amazon are lying and they are storing/analysing everything the Echo hears, surely this would be easy to prove?


It is possible to see all traffic it sends, and possibly even fake certificate authorities (depends on how resilient the Alexa is to this tampering) and trick the Alexa into giving you the data it sends encrypted using a key that you control.

However, this line of reasoning can be refuted all the way down to being impossible to prove/disprove. For example, there is reasonably an audio processing chip in Alexa that does always-on keyword listening, and it's possible it could track breadcrumbs over time (e.g., voice fingerprints, triggering keywords like "bomb", etc). This data can then be interlaced with innocuous data, for example inside an access token (opaque blob used to identify on whose behalf the Alexa is making requests). That would make it virtually impossible to find even if you had full access to the network traffic.

Anyway, when it comes to these things I like to take an Occam's razor approach. There's a great number of things a company can do to spy on you, but most likely when it comes to mass surveillance it's easier to tap into more obvious sources of data like your browsing history from the ISP, your phone line, Facebook/Google tracking data. In fact, I'd be more scared of say Facebook's and Google's voice assistants than Amazon or Apple because the latter two don't depend as much on consumer identity as a business.


Strong encryption is a thing.

EDIT: Another thing that just came to my mind. Even when you analyze network traffic and observe that traffic only occurs during your queries (i.e. in the seconds after the hotword is uttered), that doesn't mean that the Echo won't use the opportunity to send some previously-recorded audio to the server together with the current recording. In the same way that clever hackers disguise themselves by having their network traffic mimic the shape and direction of legitimate network traffic.


Yes but we could could look at the amount of of data transmitted in total. Audio compression is well understood, and can infer within an range of usable quality, if any excess voice or other data is sent over the network.


So what you're saying is, if a company like Amazon or Google has the excess bandwidth, it is beneficial for them to send way too much data in the first place in order to disguise what data is actually being sent.

Now, there is some security basis

http://www.cs.unc.edu/~fabian/papers/tissec2010.pdf

>Uncovering Spoken Phrases in Encrypted Voice over IP Conversations


Assuming its sending it as audio, and not as transcribed text which is both smaller and also much more compressible.


ASR is a hugely complex process that is handled by ML algorithms on Amazon's servers. The echo simply does not have the hardware to handle this on it's own.


Is it though? Not trying to be argumentative but I remember using dragon naturally speaking to do voice dictation way back in like 98 on a processor that makes today's average smartphone look like a supercomputer. I thought all the ML stuff was for figuring out context and the like, but straight transcription?


Modern voice codecs are extremely compact. An annotated text representation of voice will take up equivalent space.


You own the client. You can break any crypto it is doing.


I'm sure you could use Wireshark and see what requests are being made, however, they very likely use TLS so getting the content of those requests would be extremely difficult if not completely impossible.

However, if you don't mind potentially destroying your echo, I'm sure you could reverse engineer a way to see what's going on.


As far as I know, only this year's Echo models don't have a known way to root them, so you could likely circumvent the encryption on an older model to inspect traffic. I'm not aware of any publicized results of someone doing that though, and it doesn't necessarily tell you what the backend can and can't extract from the audio data.




Not quite the same thing but Rbutr (http://www.rbutr.com/) was features on HN a while back.

In their own words:

"rbutr tells you when the webpage you are viewing has been disputed, rebutted or contradicted elsewhere on the internet."


I agree. This analogy is good up to the point where you consider that these trackers don't really know or care who you are. To them you're an anonymous hashed id.

Yes, they 'follow' you around, but they are essentially invisible and mostly aim to improve the targeting of ads/information.

It's easy to forget that a lot of this technology is very new and for a while there will be cases where it's seen as intrusive. Things will only get better over time.


> To them you're an anonymous hashed id.

You wish.


I've worked very closely with tracking companies. They are very strict about not storing any unhashed identifyable information such as email adddress, postcode etc.


Some are good, some are in compliance with the law and some are not. It's a mixed bag, and then of course there is the small detail that 'the law' is not the same from one place to another and that plenty of companies use this to their advantage.


Have you ever seen hotjar, inspectlet, mouseflow and many other service? I mean check out the demo page on the inspectlet site, type in your email address, check the recording and tell me they don't store it in plain text.


Planet Earth is by far the best nature documentary I've ever seen. I'd recommend it to anyone who's yet to see it.


Similarly, Twitter. Status updates are great, but a separate social network just for that?


Agreed. It took me a while to join Twitter. I was reluctant at first because I thought: "Why the hell would anyone want to hear my random thoughts?" I didn't realize that I was the one who wanted to hear OTHER people's random thoughts.


same here, it's like subscribing to everyone's facebook when i can barely tolerate my own facebook feed


Domain names are a market just like any other. If someone buys a domain name to make money from affiliate links that's their choice, I don't have a problem with that. Don't like it? Come up with a more profitable use for the domain name and buy it from them.


As a Gmail user it annoys me when people attach Outlook emails to messages in a format that is readable only in Outlook. Come on Microsoft, play nicely. You're not the only player anymore.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: