Who cares if voice assistants listen to us?

Barry Collins likes that Alexa listens to everything he says – nobody else does

It's a little-known fact that men's brains are fitted with a 4GB memory chip that's constantly recording background conversations. It's why, when you've got your head buried in The Times crossword and your other half barks: "are you listening to me?", we're able to respond: "Yes, put the recycling bin out and feed the dog at half one" without having actually registered a single word of the original conversation.

Many people suspect Amazon's Echo speakers are similarly equipped. That they're sat there in the corner, like Darth Vader's Pringles tube, secretly recording every last word we utter: conversations with the dog, the wrong answers to questions on University Challenge, the access codes for the nuclear reactor under the conservatory. I've lost count of the number of people to whom I've recommended the Echo, who give a derisory snort and say: "Put a device in my living room that's recording everything I say? No, ta".

In many ways, the fear is understandable. We've all read the stories about webcams and smart televisions being used as bugging devices. We've all seen the pictures of Facebook founder Mark Zuckerberg with the little piece of black tape over his laptop's webcam. We've all read the Snowden revelations of mass government surveillance. Only the paranoid survive, as Intel's Andy Gove said.

And let's be clear: the notion that Amazon's speakers could be turned into some sort of bugging device isn't ridiculously far-fetched. Any device with a microphone and an internet connection is potentially susceptible to hackers. No device is 100% secure.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

However, there are a few reasons why I'm not losing any sleep over Alexa grassing me up to MI5, not least because I'm somewhere between Nanette Newman and the Dalai Lama on the list of terror suspects. Firstly, Amazon's Echo devices only record what you say after you utter the 'wake word', which is normally 'Alexa'. So unless you're asking Alexa how to make a nail bomb, it's unlikely what you say will ever find its way back to GCHQ.

Ah, I hear you whelp, wasn't there a US murder case where the prosecution wanted access to the accused's Alexa recordings? There was, and it is indeed true that Amazon stores recordings of what you say after the 'wake' word. If you go to Settings, History in your Amazon app, you can listen to and delete these recordings. The prosecutors were looking for evidence that might have been captured in the background of these recordings, so if you're ever being murdered in your own home, scream: "Alexa, my wife is strangling me for not putting the bins out", and your other half's looking at a 10-year stretch, at the very least. Still, the chances of these brief audio snippets ever being sufficient to form evidence against you are vanishingly small.

The final reason I'm not bothered by Alexa's eavesdropping abilities is that even the known exploits aren't exactly terrifying. On the day I'm writing this column, news websites are frothing about "Alexa being turned into a snooping device!". Except the exploit itself requires hackers to break into your house, remove the base of the Echo speaker and fiddle with its software. Which begs the question: why not just plant a tiny listening device and bypass the Echo altogether?

If you're still not reassured, lay it on the line with your Echo. Say: "Alexa, I want the truth." Just prepare yourself beforehand: you may not be able to handle the answer.

This article originally appeared in Web User. Main image credit: Web User

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020