{"id":5896,"date":"2024-11-05T05:35:59","date_gmt":"2024-11-05T05:35:59","guid":{"rendered":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/05\/is-my-phone-always-listening\/"},"modified":"2024-11-05T05:35:59","modified_gmt":"2024-11-05T05:35:59","slug":"is-my-phone-always-listening","status":"publish","type":"post","link":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/05\/is-my-phone-always-listening\/","title":{"rendered":"Is my phone always listening?"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"\">\n<p data-block-key=\"n2i6u\">Welcome to \u201cAsk a security trainer,\u201d the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Let\u2019s jump right into this week\u2019s question.<\/p>\n<p data-block-key=\"eglev\"><i>Dear DST,<\/i><\/p>\n<p data-block-key=\"2bdc8\"><i>I was talking to my partner about getting some new shoes, and then I started receiving advertisements for new shoes. This really creeped me out, and once I started noticing it happening all the time. I have to know, is my phone really always listening to me?<\/i><\/p>\n<p data-block-key=\"45sa5\"><i>Signed,<\/i><\/p>\n<p data-block-key=\"72k78\"><i>Mic Drop<\/i><\/p>\n<p data-block-key=\"7t23k\">\u2013<\/p>\n<p data-block-key=\"7h3oi\">Dear Mic Drop, this is such a great question. The short answer is \u201cyes, but.\u201d If you use an AI assistant, your microphone is always listening for specific words (e.g., \u201cHey Siri!\u201d or \u201cOK Google!\u201d). But these magic words are only processed on the device. Only after you say them, will your device beam your requests (e.g., \u201cWhat\u2019s the weather like today?\u201d) to Apple or Google for processing. So technically, your phone <i>is<\/i> always listening for an activation command, but it\u2019s unlikely what you say will be sent anywhere unless you explicitly ask for it to be sent.<\/p>\n<p data-block-key=\"5c48k\">Of course, it\u2019s possible there are dodgy permissions on your apps or even malware on your device, but there\u2019s a lot we can do to prevent these possibilities. Chances are, then, the ads you\u2019re seeing are likely not related to your microphone but, instead, behavioral tracking software built into the apps you use every day.<\/p>\n<p data-block-key=\"5sgce\">Let\u2019s unpack all of this, starting first with AI assistants. The AI assistant built into your smartphone has two listening modes: one is low-powered and functionally asleep until \u201cwoken up\u201d with a certain trigger word, and the other is wide-awake, conducts more advanced processing, and may send off requests to the service provider (in this case <a href=\"https:\/\/machinelearning.apple.com\/research\/hey-siri\" target=\"_blank\" rel=\"noopener\">Apple<\/a> or <a href=\"https:\/\/safety.google\/assistant\/\" target=\"_blank\" rel=\"noopener\">Google<\/a>). When you activate the first mode with the trigger word, the second mode fulfills your request.<\/p>\n<p data-block-key=\"t1cu\">Your phone is probably not deriving targeted ads from your microphone \u2014 there are lots of other places to collect data. Many of the apps and websites you browse will closely track the things you open and click on, and sometimes sell this data to third parties. Those third parties may sell to yet more third parties and \u2026 you get the idea.<\/p>\n<p data-block-key=\"81ohn\">When companies begin aggregating these patterns, they will use them to try to predict buying habits when serving ads. These interest-based profiles are extremely valuable to marketers, who will serve ads that respond to your clicks. Often, their predictions are simply wrong, and we don\u2019t think twice about it. But when they\u2019re right, it\u2019s creepy how they seemed to know, almost like they were listening to our conversations.<\/p>\n<p data-block-key=\"c2jo8\">Behind the scenes, most practical tracking just focuses on clicks. Examples of tracking tools useful for marketers to determine an identity online include cookies and advertising IDs. Some of this is hard to avoid, but it\u2019s easy to <a href=\"https:\/\/www.eff.org\/deeplinks\/2022\/05\/how-disable-ad-id-tracking-ios-and-android-and-why-you-should-do-it-now\" target=\"_blank\" rel=\"noopener\">disable advertising IDs in your settings<\/a> to slow down some tracking on your mobile device. To dive deep on this topic, <a href=\"https:\/\/www.eff.org\/wp\/behind-the-one-way-mirror\" target=\"_blank\" rel=\"noopener\">check out this resource from the Electronic Frontier Foundation<\/a>.<\/p>\n<p data-block-key=\"blmb1\">Finally, malware can enable your microphone without your permission, but malware is much more for running fraud schemes and \u2014 <a href=\"https:\/\/citizenlab.ca\/category\/research\/targeted-threats\/\" target=\"_blank\" rel=\"noopener\">in rarer high-risk cases<\/a> \u2014 governments monitoring individuals. While state-sponsored surveillance like this is a real threat for some journalists, the most common risks remain <a href=\"https:\/\/cybernews.com\/privacy\/android-apps-are-asking-for-too-many-dangerous-permissions-heres-how-we-know\/\" target=\"_blank\" rel=\"noopener\">behavioral tracking by marketing firms<\/a>.<\/p>\n<p data-block-key=\"83po3\">To minimize potential risk associated with behavioral tracking and other forms of surveillance, we always recommend journalists remove unnecessary apps and regularly review app permissions. You can check which apps have access to your microphone \u2014 as well as your location, camera, photos, and so on \u2014 and decide whether or not you think they really need that access. For example, does <a href=\"https:\/\/www.makeuseof.com\/weather-app-spying-on-you\/\" target=\"_blank\" rel=\"noopener\">your weather app<\/a> <i>really<\/i> need access to your camera, microphone, and contacts?<\/p>\n<p data-block-key=\"dha4p\">In terms of malware, the best way to deal with potentially malicious software on your device is to:<\/p>\n<p data-block-key=\"54cvs\">1) Only download apps from official distributors and reputable developers, and<\/p>\n<p data-block-key=\"73vsh\">2) Simply keep your phone up to date! Software updates frequently contain security patches and fixes to other vulnerabilities.<\/p>\n<p data-block-key=\"9lu1j\">If you\u2019re looking for more in-depth guidance on how to prevent your device from being surveilled, <a href=\"https:\/\/freedom.press\/training\/your-smartphone-and-you-handbook-modern-mobile-maintenance\/\" target=\"_blank\" rel=\"noopener\">read our guide to securing your mobile device<\/a>.<\/p>\n<p data-block-key=\"7imr7\">Meanwhile, hope you enjoy the new shoes!<\/p>\n<p data-block-key=\"citeg\">Securely yours,<\/p>\n<p data-block-key=\"7omo5\">Martin Shelton<\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/freedom.press\/digisec\/blog\/advice-column-6\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to \u201cAsk a security trainer,\u201d the column where the Digital Security Training team at Freedom of the Press Foundation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5897,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/5896"}],"collection":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/comments?post=5896"}],"version-history":[{"count":0,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/5896\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/media\/5897"}],"wp:attachment":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/media?parent=5896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/categories?post=5896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/tags?post=5896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}