• ganymede@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    4 months ago

    well they’re an ad company, so being full of shit is pretty much mandatory.

    but i’m not aware of any evidence they’re actually 100% full of shit on this exact issue or not? can you explain a little more how you know for certain they’re full of shit. or you just meant “they’re most likely full of shit on this particular topic”?

    • CameronDev@programming.dev
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      4 months ago

      The capability they were claiming to have would make a three letter agency very excited. If they truely had the ability to listen to your microphone, transparently without notifying the user, they could sell that tech to every regime that wants to snoop on people, for millions of dollars.
      Instead they claim to be using it for Ad-tech, where if it existed, would make it trivial to discover and flag as malware.

      Apple and Google would also be very keen to find and squash whatever loophole let’s them record without showing the notification.

      Its just an extraordinary claim, which if true would have been exposed/validated by security researchers long ago.

      • ganymede@lemmy.ml
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        4 months ago

        Not disputing the three letter agencies

        The capability they were claiming to have would make a three letter agency very excited.

        sorry i didn’t understand. didn’t you say you don’t doubt TLAs likely already have this capability?

        oppressive regimes

        most (all?) of whom are operating outside typical legal constraints and likely already have access to the million dollar exploit trade which already exists.

        further, i’m not sure how this changes the landscape anyway? its not without precedent that variations on capabilities can be useful to more than one market segment concurrently?

        trivial to discover and flag as malware

        can you explain further what you mean by this? i’m not sure there’s anything trivial about conclusive analysis of the deep complexities and dependencies of modern smart devices

        Apple and Google would also be very keen to find and squash whatever loophole let’s them record without showing the notification.

        historically we’ve seen google can take over half a decade to address such things, afaict (welcome correction on this) apple’s generally been faster to respond, and i do agree apple’s current public image attire would be contrary to be seen to enable this. [not simping for apple btw, just stating that part of their brand currently seems to be invested in this]

        in reality there are a confluence of many agendas and there’s likely ALOT of global users running non-bleeding edge or other variations on the myriad of sub-system components, regardless of what upstream entities like google implement. if you are aware of any conclusive downstream binary analyses please link

        which if true would have been exposed/validated by security researchers long ago.

        i agree the probability of discovery increases over time. and the landscape is growing more hostile to such activities. yet i’m not aware that a current lack of published discovery is actual proof it’s never happened.

        tbh we have our doubts this leak is directly connected to solid proof “they are listening”.

        but we’re not currently aware of any substantiated reasons to say with certainty “they’re absolutely not listening”

        • CameronDev@programming.dev
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          4 months ago

          The capabilities TLAs have costs hundreds of millions of dollars to develop, and once caught, are worthless. TLAs are extremely careful with their toys to avoid them being caught.

          This Adtech company is claiming to have something at that level, which they are deploying everywhere. If it existed, it would have been found the day after they announced it, the security researcher industry would be all over it. They are very intelligent people who do understand those devices inside and out, if it existed they would find it. Remember, these are the same researchers who frequently out actual TLA tools.

          You can’t prove a negative, so it definitely is a probability thing, but I put the probability at basically 0 that they have what they claim.

          https://arstechnica.com/gadgets/2023/12/no-a-marketing-firm-isnt-tapping-your-device-to-hear-private-conversations/

          • ganymede@lemmy.ml
            link
            fedilink
            arrow-up
            4
            ·
            edit-2
            4 months ago

            happy to get into into these subtopics, but it’s also possible i may not be understanding you properly because i agree with alot of what you just said.

            what are you attributing the close to 0 probability to?

            if you wanna say “whats the probability that CMG was at least partly talking out their arse about their capabilities (and especially any claim they were currently in possession of that capability)?”

            i’d also give it like >90% probability they (CMG) are full of shit. in which case you could say i agree with you (to within say 10% error margin).

            if you’re instead saying the probability is ~100% that audio surveillance capability cannot possibly currently exist outside TLAs because “someone would’ve published it already” then i really cannot agree. (and afaict that ars article does not support that stance either)

            • CameronDev@programming.dev
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              4 months ago

              Any idiot and chatgpt could knock up an overt always listening app in an afternoon. I have no doubt shady apps already can do this. Its not hard or expensive. (Backend storage and audio processing costs are a different kettle of fish, and I think those make this fairly prohibitive as well, but that’s a funding problem, not a technical problem.)

              But as soon as they make the claim that it doesn’t trigger the microphone LED on iOS and Android, across all devices, then that’s a “technically hard” problem. That’s multiple zero days across multiple devices. Its just not feasable for an ad tech firm. They would never be able to recoup that investment.

              I’m happy to be proven wrong, but so far all the researchers in the world have found nothing.

              So I’m attributing near 0% chance that anyone outside of nation states have the later tech (device agnostic covert audio recording).

                • CameronDev@programming.dev
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  4 months ago

                  That’s just what CMG claimed to have.

                  But to be useful for an advertising network, it kinda needs to be installable on everything. And if it failed to suppress the mic LED on a single device, it would be very easily noticed?