{"id":27817,"date":"2019-08-02T05:17:06","date_gmt":"2019-08-02T09:17:06","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=27817"},"modified":"2019-11-15T06:24:03","modified_gmt":"2019-11-15T11:24:03","slug":"smartphones-eavesdropping","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/smartphones-eavesdropping\/27817\/","title":{"rendered":"Eavesdropping smartphones: Fact or fiction?"},"content":{"rendered":"<p>It\u2019s an oft-repeated tale: Someone talks with a friend about a certain thing, and then, bang, an ad for it appears on the smartphone screen.<\/p>\n<p>Some cases are easy to explain. A colleague of mine who was about to get married claims that she never googled wedding dresses, yet the pesky search engine started suggesting them all the same. And then, three months after the wedding, products for newborns began appearing in her search results, although she was not even planning to have children. There\u2019s no great mystery here, we can dispense with the conspiracy theories.<\/p>\n<p>But some cases arouse more suspicion. For example, you\u2019ve never had a barbecue before, one day you voice the idea, and, all of a sudden, you see an ad for barbecue equipment. Coincidence?<\/p>\n<p>After hearing such stories, or experiencing them personally, many people become convinced that the Internet giants are all listening to us through smartphone microphones. Fact or fiction? We\u2019ll discuss that a bit later, but first we suggest that you conduct your own high-tech experiment.<\/p>\n<h2>Experiment: Tell your smartphone something it wouldn\u2019t expect<\/h2>\n<p>Here\u2019s the setup: Get together with some friends, place your phones on the table, and have a lively conversation about something that none of you have ever thought about before. Say: \u201cA fl00d c0ntr0l system? I\u2019ve always dreamed of buying a fl00d c0ntr0l system. Wouldn\u2019t it be great to find a cheap fl00d c0ntr0l system and buy it!\u201d The key words here are distorted on purpose, so that search engines don\u2019t think that you want to buy a certain kind of system only because you are reading this article (which, of course, mentions them).<\/p>\n<p>Don\u2019t get your smartphone hung up on a product that you might actually want. Be creative and come up with something you\u2019ll never want to buy in a million years. Maybe a w1gwam. Or a cap1barra.<\/p>\n<p>But there\u2019s one more condition: Do not under any circumstances search for the words you use, or the experiment will flop. That includes using voice assistants such as Siri, Alexa, Cortana, or Google Assistant. Speaking of Google, you can use <a href=\"https:\/\/myactivity.google.com\/myactivity\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this link<\/a> to see what it\u2019s harvested on you just today.<\/p>\n<p>After you and your friends have had a chinwag, keep mentioning the chosen word in passing for the next week. For example: \u201cHey, I was just thinking about getting a fl00d c0ntr0l system for the new w1gwam I want to buy\u2026\u201d<\/p>\n<p>My colleagues and I also conducted this experiment (see the results at the end of the post).<\/p>\n<h2>Smartphone ads\u00a0\u2014 a magical coincidence?<\/h2>\n<p>Now for the fact-or-fiction question. There are several explanations for how the search giants sometimes hit a bull\u2019s-eye, that doesn\u2019t involve conspiracy theories about eavesdropping through the microphone.<\/p>\n<h3>Explanation 1: Internet services build accurate models<\/h3>\n<p>In the article \u201c<a href=\"https:\/\/qz.com\/1609356\/your-phone-is-not-recording-your-conversations\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Your phone isn\u2019t really spying on your conversations\u00a0\u2014 the truth might be even creepier<\/a>,\u201d a former Google employee says that Google and Facebook essentially have a digital avatar of you that tries to replicate your behavior with the aid of machine-learning methods. At some point, your digital stand-in becomes so much like you that it begins to predict what you want.<\/p>\n<div id=\"attachment_27818\" style=\"width: 1310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051336\/smartphones-eavesdropping-1-EN.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-27818\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051336\/smartphones-eavesdropping-1-EN.jpg\" alt='&lt;a href=\"https:\/\/vas3k.com\/blog\/machine_learning\/\" target=\"_blank\" rel=\"noopener\"&gt;Source&lt;\/a&gt;. Warning: After you read this article, Google may start recommending meatbags to you' width=\"1300\" height=\"601\" class=\"size-full wp-image-27818\"><\/a><p id=\"caption-attachment-27818\" class=\"wp-caption-text\"><a href=\"https:\/\/vas3k.com\/blog\/machine_learning\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Source<\/a>. Warning: After you read this article, Google may start recommending meatbags to you<\/p><\/div>\n<p>About Facebook, I heard it can determine whether a woman is pregnant even before she herself knows\u00a0\u2014 by the rate she scrolls through the social network\u2019s feed.<\/p>\n<p>Personally, I\u2019m disinclined to believe in such telepathic abilities, but there is definitely some truth to this one. Machine learning is really hitting new heights every single year. By the way, our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/machine-learning-in-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">behavioral model<\/a>, one of our threat detection methods, operates along similar lines. The basic idea is that if it quacks like a duck, it probably is a duck \u2014 that is, if a suspicious file behaves like a known piece of malware, then it\u2019s probably malicious.<\/p>\n<h3>Explanation 2: Accidental activation of the voice assistant<\/h3>\n<p>Another explanation for the search giants\u2019 omniscience is the random activation of voice assistants. Sometimes, the phone thinks you said \u201cAlexa,\u201d \u201cOk Google,\u201d \u201cHey Siri,\u201d or \u201cCortana,\u201d when in fact you didn\u2019t.<\/p>\n<p>It\u2019s not necessary to pronounce these trigger words properly.\u00a0Something similar is likely to produce the same effect and turn on the assistant \u2014 after which the phone really does listen in on everything, and then starts making relevant suggestions.<\/p>\n<div id=\"attachment_27819\" style=\"width: 609px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051341\/smartphones-eavesdropping-2.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-27819\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051341\/smartphones-eavesdropping-2.jpeg\" alt=\"Eavesdropping smart speakers\" width=\"599\" height=\"328\" class=\"size-full wp-image-27819\"><\/a><p id=\"caption-attachment-27819\" class=\"wp-caption-text\">Eavesdropping smart speakers<\/p><\/div>\n<p>In standby mode, even stand-alone voice assistants (such as those in smart speakers) do not constantly capture your speech\u00a0\u2014 they wait to be addressed. So as to catch the switch-on command, the device uses a small buffer (a few seconds\u2019 worth of audio storage), a dedicated (and relatively weak) processor, and a speech recognition algorithm tuned to a specific word.<\/p>\n<p>That\u2019s all running all of the time, but it consumes little power and no Internet traffic at all. Only when it detects the trigger word does the device wake up fully, connect to the server, and transfer recorded data for recognition.<\/p>\n<div id=\"attachment_27820\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051356\/smartphones-eavesdropping-3-EN.png\"><img decoding=\"async\" width=\"1080\" height=\"960\" aria-describedby=\"caption-attachment-27820\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/02051356\/smartphones-eavesdropping-3-EN.png\" alt=\"By the way, the assistant in your smartphone sees what's on the screen. You don't have to talk about it, just let it read\" style=\"width:360px\" class=\"size-full wp-image-27820\"><\/a><p id=\"caption-attachment-27820\" class=\"wp-caption-text\">By the way, the assistant in your smartphone sees what\u2019s on the screen. You don\u2019t have to talk about it, just let it read<\/p><\/div>\n<h3>Explanation 3: User domains<\/h3>\n<p>Let\u2019s say you talked with your friend or spouse about deodorant or the need for some (hopefully not), after which you did <em>not<\/em> start searching for it. But they did. If you see an ad for deodorant after the conversation, don\u2019t be too surprised.<\/p>\n<p>The thing is that the Internet service already suspects that your two accounts are somehow linked if you often hang out in the same place, perhaps on the same Wi-Fi network, maybe even take turns logging in to the same device. Such users may get put into \u201cdomains\u201d by search engines, whereupon they\u2019re shown some of the same products because they may make purchasing decisions together.<\/p>\n<p>It\u2019s impossible to say for sure that this happens, but such actions on the part of Internet services would be logical.<\/p>\n<h3>Explanation 4: Lucky guesses<\/h3>\n<p>I often see advertising that doesn\u2019t match my interests: sauna equipment, pregnancy tests, trips to wherever \u2014 you name it. You\u2019ve probably seen similar stuff.<\/p>\n<p>But many people use search engines, so it\u2019s possible that a random ad blitz might one day catch you after you\u2019ve been talking to a friend about the benefits of saunas. And then you post online that your phone is spying on you. Meanwhile, folks who saw the same ad, but didn\u2019t discuss saunas, write nothing. One story is seen, and the other one is never even told.<\/p>\n<p>Such coincidences are nowhere near as surprising as they might seem. Here\u2019s an example. Eight teams get to the quarterfinals of some championship. There are 4 + 2 + 1 = 7 matches left to play in the tournament. Each match can have two outcomes \u2014 either the first team or the second wins (there are no draws). The total number of possible scenarios is two to the power of seven\u00a0\u2014 2^7 \u2014 128.<\/p>\n<p>Suppose there is a residential building containing 128 apartments. If we place one prediction for each possible outcome in each apartment\u2019s mailbox, it\u2019s a fact that we will supply the owner of one of the apartments with a 100% accurate prediction. He will be astounded, but in reality, it\u2019s just that our sample was sufficiently large.<\/p>\n<h2>How not to do the experiment<\/h2>\n<p>One vlogger conducted a similar, yet very different experiment. Broadcasting live on YouTube, he deliberately started talking about dog toys. He then demonstrated that Google ads had adapted in a matter of seconds.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/zBnDWSvaQ1I?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Here\u2019s a crucial difference between this experiment and the one we suggested above: In the vlogging case, the microphone was turned on from the start, voice information went straight to Google, and, guess what, Google acted on it. The only surprising part here is the response time \u2014 it happened amazingly fast.<\/p>\n<p>We, on the other hand, are exploring a fundamentally different question: Does the microphone get secretly turned on without our knowledge, and does the smartphone listen in on conversations and pass information to the server?<\/p>\n<p>It\u2019s also important to note that when the search giants receive voice information from us (by one of the legal methods described above), <a href=\"https:\/\/www.wired.com\/story\/whos-listening-talk-google-assistant\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">real people can and do actually listen to it<\/a>. The purpose is to improve voice recognition. But what if you dictate your name, address, and medical history? That\u2019s no different than text search queries: You share what you ask, unconditionally.<\/p>\n<h2>Conclusion<\/h2>\n<p>Let\u2019s get back to the results of our experiment. None of my colleagues with whom I discussed, actively and at length (for a whole week!), the fascinating topic of cornices in the company of our smartphones got hit by ads for cornices, although we were drowning in advertising about other trifles.<\/p>\n<p>Finally, for the experiment to be representative, more experimenters are required. So, join in! Write to us on social networks about the exotic stuff you\u2019re supposedly desperate to buy. Just replace a couple of letters in the word with numbers that look similar, or you\u2019ll blow the secret word\u2019s cover.<\/p>\n<p>Here\u2019s a yarn to wrap things up. A buddy of mine complained to colleagues that spoons were always going missing from the office kitchen. They decided to play a joke on him by ending all work e-mails to him with the words \u201cspoons spoons spoons spoons\u201d in white font. The mail client was Gmail. What happened? The poor guy started seeing ads for nothing but spoons. That looked pretty suspicious.<\/p>\n<p>So, don\u2019t just believe the rumors, get involved in the experiment!<\/p>\n<p>P.S.: Or you could simply install <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>, enable Anti-Banner and Private Browsing features,\u00a0and not perform any experiments. These two technologies cut out not only ads (including YouTube commercials), but also numerous online tracking tools used by thousands of companies all over the Web.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Many swear phones secretly listen in through their built-in microphones. We investigate the claims\u00a0\u2014 and offer other explanations for spookily precise mobile ads.<\/p>\n","protected":false},"author":669,"featured_media":27821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[43,45,2618,768,2949],"class_list":{"0":"post-27817","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-privacy","9":"tag-smartphones","10":"tag-speech-recognition","11":"tag-surveillance","12":"tag-voice-assistants"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smartphones-eavesdropping\/27817\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/smartphones-eavesdropping\/16313\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/smartphones-eavesdropping\/13817\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/smartphones-eavesdropping\/6401\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/smartphones-eavesdropping\/18320\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/smartphones-eavesdropping\/16396\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/smartphones-eavesdropping\/15073\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/smartphones-eavesdropping\/19004\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/smartphones-eavesdropping\/17741\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smartphones-eavesdropping\/23201\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/smartphones-eavesdropping\/6300\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/smartphones-eavesdropping\/12070\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/smartphones-eavesdropping\/12190\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/smartphones-eavesdropping\/11034\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/smartphones-eavesdropping\/19862\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/smartphones-eavesdropping\/10085\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/smartphones-eavesdropping\/23848\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/smartphones-eavesdropping\/18719\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smartphones-eavesdropping\/23124\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smartphones-eavesdropping\/23064\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/smartphones\/","name":"smartphones"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/669"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=27817"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27817\/revisions"}],"predecessor-version":[{"id":29390,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27817\/revisions\/29390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/27821"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=27817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=27817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=27817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}