iPhone’s Siri hacked for Android

Mobile developers crack smartphone voice recognition software protocol for use on other devices

iPhone 4S

A mobile development firm has published a hack for the protocol used for Apple's mobile voice recognition personal assistant Siri.

Applidium developers have said the hack has enabled them to use Siri's recognition engine on any device, little more than a month after Apple launched the natural language processing technology-based software on its iPhone 4S device.

They were able to crack the open HTTP protocol Siri uses to communicate with a remote server, which it relies on to process commands over a 3G or Wi-Fi connection, so it could be ported to other devices, including those running Google's Android OS.

I'd fully expect it to move to other iPhones and iPads once the wrinkles have been removed.

"Yes, that means anyone could now write an Android app that uses the real Siri," the firm said in a report posted on its website. "Or use Siri on an iPad! And we're going to share this know-how with you."

The developers sniffed Siri's HTTP traffic by setting up a proxy server and configuring the iPhone 4S to use it. Only then did they realise its traffic was TCP based by using tcpdump on a network gateway. This revealed a certificate that suggested Siri was communicating with a server named guzzoni.apple.com over HTTPS.

"Basically all we had to do was to setup a custom SSL certification authority, add it to our iPhone 4S, and use it to sign our very own certificate for a fake 'guzzoni.apple.com.' And it worked: Siri was sending commands to your own HTTPS sever," the company explained. "Seems like someone at Apple missed something!"

Applidium described Siri's protocol as "opaque" and "very chatty" after further reverse engineering work. "Your iPhone sends a ton of things to Apple's servers," it said. "And those servers reply an incredible amount of information. For example, when you're using text-to-speech, Apple's server even reply a confidence score and the timestamp of each word."

It has released a set of tools, written in Ruby, C and Objective-C languages, to understand the protocol, which should be sufficient to allow anyone with the technical knowledge to write a Siri-enabled application.

"Let's see what fun application you guys get to build with it," the company added. "Let's see how long it'll take Apple to change their security scheme."

Apple had not responded to requests for comment at the time of writing.

But Rob Bamforth, principal communications and convergence analyst for Quocirca, told IT Pro that the hack did not really constitute a serious breach. "Apple only seemed to be limiting Siri to keep the lid on early use," he said.

"It might not fancy being a wide open service at this stage, based on Apple's track record of openness, but I'd fully expect it to move to other iPhones and iPads once the wrinkles have been removed, and the 'premier' status of Siri has passed."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021