• theshatterstone54@feddit.uk
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    3 months ago

    Somewhat misleading title. What’s actually happening is an ad company that worked with Big Tech had tried to pitch the idea to their Big Tech partners (claiming devices are already listening so why not use it for ads), at which point the Big companies tried to distance themselves from the ads people (in theory). In practice,

    Google removed CMG from the Partners Program after a review.

    With no mention of whether the removal was related to the evil practices described above.

      • CameronDev@programming.dev
        link
        fedilink
        arrow-up
        11
        arrow-down
        1
        ·
        3 months ago

        Not disputing the three letter agencies, but there is zero evidence that that ad company ever had the tech or ability. They were/are just full of shit.

        • ganymede@lemmy.ml
          link
          fedilink
          arrow-up
          5
          arrow-down
          1
          ·
          edit-2
          3 months ago

          well they’re an ad company, so being full of shit is pretty much mandatory.

          but i’m not aware of any evidence they’re actually 100% full of shit on this exact issue or not? can you explain a little more how you know for certain they’re full of shit. or you just meant “they’re most likely full of shit”?

          • CameronDev@programming.dev
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            3 months ago

            The capability they were claiming to have would make a three letter agency very excited. If they truely had the ability to listen to your microphone, transparently without notifying the user, they could sell that tech to every regime that wants to snoop on people, for millions of dollars.
            Instead they claim to be using it for Ad-tech, where if it existed, would make it trivial to discover and flag as malware.

            Apple and Google would also be very keen to find and squash whatever loophole let’s them record without showing the notification.

            Its just an extraordinary claim, which if true would have been exposed/validated by security researchers long ago.

            • ganymede@lemmy.ml
              link
              fedilink
              arrow-up
              4
              ·
              edit-2
              3 months ago

              Not disputing the three letter agencies

              The capability they were claiming to have would make a three letter agency very excited.

              sorry i didn’t understand. didn’t you say you don’t doubt TLAs likely already have this capability?

              oppressive regimes

              most (all?) of whom are operating outside typical legal constraints and likely already have access to the million dollar exploit trade which already exists.

              further, i’m not sure how this changes the landscape anyway? its not without precedent that variations on capabilities can be useful to more than one market segment concurrently?

              trivial to discover and flag as malware

              can you explain further what you mean by this? i’m not sure there’s anything trivial about conclusive analysis of the deep complexities and dependencies of modern smart devices

              Apple and Google would also be very keen to find and squash whatever loophole let’s them record without showing the notification.

              historically we’ve seen google can take over half a decade to address such things, afaict (welcome correction on this) apple’s generally been faster to respond, and i do agree apple’s current public image attire would be contrary to be seen to enable this. [not simping for apple btw, just stating that part of their brand currently seems to be invested in this]

              in reality there are a confluence of many agendas and there’s likely ALOT of global users running non-bleeding edge or other variations on the myriad of sub-system components, regardless of what upstream entities like google implement. if you are aware of any conclusive downstream binary analyses please link

              which if true would have been exposed/validated by security researchers long ago.

              i agree the probability of discovery increases over time. and the landscape is growing more hostile to such activities. yet i’m not aware that a current lack of published discovery is actual proof it’s never happened.

              tbh we have our doubts this leak is directly connected to solid proof “they are listening”.

              but we’re not currently aware of any substantiated reasons to say with certainty “they’re absolutely not listening”

              • CameronDev@programming.dev
                link
                fedilink
                arrow-up
                3
                arrow-down
                1
                ·
                3 months ago

                The capabilities TLAs have costs hundreds of millions of dollars to develop, and once caught, are worthless. TLAs are extremely careful with their toys to avoid them being caught.

                This Adtech company is claiming to have something at that level, which they are deploying everywhere. If it existed, it would have been found the day after they announced it, the security researcher industry would be all over it. They are very intelligent people who do understand those devices inside and out, if it existed they would find it. Remember, these are the same researchers who frequently out actual TLA tools.

                You can’t prove a negative, so it definitely is a probability thing, but I put the probability at basically 0 that they have what they claim.

                https://arstechnica.com/gadgets/2023/12/no-a-marketing-firm-isnt-tapping-your-device-to-hear-private-conversations/

                • ganymede@lemmy.ml
                  link
                  fedilink
                  arrow-up
                  4
                  ·
                  edit-2
                  3 months ago

                  happy to get into into these subtopics, but it’s also possible i may not be understanding you properly because i agree with alot of what you just said.

                  what are you attributing the close to 0 probability to?

                  if you wanna say “whats the probability that CMG was at least partly talking out their arse about their capabilities (and especially any claim they were currently in possession of that capability)?”

                  i’d also give it like >90% probability they (CMG) are full of shit. in which case you could say i agree with you (to within say 10% error margin).

                  if you’re instead saying the probability is ~100% that audio surveillance capability cannot possibly currently exist outside TLAs because “someone would’ve published it already” then i really cannot agree. (and afaict that ars article does not support that stance either)

  • monobot@lemmy.ml
    link
    fedilink
    arrow-up
    9
    arrow-down
    2
    ·
    3 months ago

    We all had experience with ads showing up after we talked in person with someone about topic. I don’t need some random person ir media telling me something obvious is happening. And for some time already.

    • deranger@sh.itjust.works
      link
      fedilink
      arrow-up
      14
      arrow-down
      1
      ·
      edit-2
      3 months ago

      I really doubt they’re listening to your microphone. Constantly uploading your audio would be noticeable in bandwidth and constantly analyzing audio on device would kill your battery - at least currently.

      What this demonstrates is how good tracking by other methods is getting. You don’t need to listen to someone’s microphone when you know what they and their friends/coworkers are looking up online and likely bringing up in conversation. It’s trivial to fingerprint someone and track near everything they’re looking up online, and even if you’re privacy conscious, many of those you associate with share their contact list with every app that asks for it. This makes suggesting things your friends are looking up pretty easy. Add a bit of confirmation bias to the mix and you’ve got this “listening to the microphone” theory, because you’re not counting the number of times an ad isn’t something you’ve been recently discussing.