Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The past few years have been huge for voice-activated command services. It seems like every major tech manufacturer has one on the market.
Whether youâre using Amazon Alexa, Google Assistant, Appleâs Siri or Microsoft Cortana, itâs hard to ignore the hands-free revolution.
But how secure are your communications? Are your commands really kept between you and the device? Where is all of this information stored?
Answering these questions is critical when determining whether or not you want to use these personal assistants on a daily basis.
Theyâre also important when it comes time to access, manage or delete your command history.
Always On?
Contrary to popular belief, most of these devices arenât âalways on.â Instead, they only begin recording after the activation command, or âwake word,â has been issued.
In the case of Alexa and the Echo device, the command is âAlexa.â For Google Assistant, the phrase is âOK Google.â Some devices let you choose from several different wake words. Alexa users, for example, can choose between the default word of âAlexaâ and one of two other options: âAmazonâ or âEcho.â
So recording doesnât begin until youâve spoken the magic phrase. That might even be enough to put your mind at ease. But itâs important to note that these devices also store your voice commands in the cloud. As such, theyâre prime targets for hackers.
Turning the Personal Assistant Into a Personal Wiretap
Like most new technology, these voice-activated command services are prone to cyber attacks.
The Amazon Echo device has already been hacked. Mark Barnes, a British security expert, recently demonstrated how malware can turn the consumer product into a live audio surveillance stream. You can find his research on his official blog.
Markâs hack has a significant flawâââit requires access to the device and involves physical modification of the targeted hardware. Nonetheless, his proof-of-concept is enough to worry many consumers around the globe.
The Dawn of BlueBorne
Another hackâââone which uses a Bluetooth exploitâââwas identified in late 2017.
Known as BlueBorne, this attack doesnât involve physical access to any device. It doesnât even require the end-user to click on any links or open any files.
As such, BlueBorne has the potential to cause widespread havoc among current users of devices like the Amazon Echo and Google Home.
BlueBorne only gets worse from there. The exploit also has the potential to take control of a remote device and infect every other device on the same network.
As if that wasnât enough, most modern malware or antivirus programs wouldnât even detect the attack.
Thankfully, the majority of these devices have already received firmware updates to patch the hole. According to recent estimates, there are still approximately 20 million devicesâââprimarily Amazon Echo and Google Home productsâââthat are susceptible.
Controlling and Managing Your Files
Most devices let you easily manage your files. Amazon Echo allows you to delete individual recordings by navigating into your device settings and your history folder.
From there, just tap on a single item and hit âDelete voice recordingsâ to finalize the action. To delete everything, sign into your Amazon Echo account at Amazonâs official website and navigate to âManage Voice Recordings.â
Although Apple recently disclosed that Siri stores data for up to 18 months, you can turn off voice dictation and Siriâs assistance to prevent voice recording and archival.
Google Home users can delete past recordings by navigating to the âMy Activityâ section of their Google account. Just like Amazon Echo, Google Home lets you remove individual or entire groups of files.
Using Voice Command Services Safely and Securely
While devices like Amazon Echo and Google Home represent huge leaps forward in smart home technology, theyâre not without their faults.
To use these products safely and securely, make sure you update them with the latest patches and enhancements.
Deleting your past messages is a good practice to minimize the damage if a hack does occur, but this can also hamper the personalization of your device.
Ultimately, it comes down to balancing your security and privacy with the amount of functionality you need.
Image by Piotr Cichosz
How to Access and Manage Your Voice Command Data was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.