{"id":7189,"date":"2017-09-26T01:12:53","date_gmt":"2017-09-26T01:12:53","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=7189"},"modified":"2023-11-17T04:38:03","modified_gmt":"2023-11-17T04:38:03","slug":"voice-hack","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/voice-hack","title":{"rendered":"How to Hack Voice Assistant: Ultrasound"},"content":{"rendered":"<h2>DolphinAttack: Inaudible Voice Command [Video]<\/h2>\n<div class=\"ytb\">\n<p style=\"text-align: center;\"><iframe title=\"DolphinAttack: Inaudible Voice Command\" width=\"620\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/21HjF4A3WE4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" href=\"https:\/\/www.youtube.com\/@guomingzhang2348\" target=\"_blank\" rel=\"noopener\">guoming zhang<\/a> on <strong class=\"watch-time-text\">August 31, 2017<\/strong><\/p>\n<h2>How They Can Hack Your Voice Assistant: Ultrasound<\/h2>\n<p>Voice is what we use as our main control tool nowadays. We can easily operate our mobile devices vocally. It\u2019s a wonderful thing in the modern world, but also a dangerous one. Depending from what perspective you look at it, it may appear to be safe. After all, the digital assistant recognizes only your voice and no one else&#8217;s. But this is all a lie.<\/p>\n<p>The problem is the gap between how we hear the voice and how the computer does. The machine has an advantage over us humans. It can understand distorted sounds and ultrasonic sounds. We\u2019ve already written about <a href=\"https:\/\/igotoffer.com\/blog\/how-ultrasonic-sound-tracks-activity\" target=\"_blank\" rel=\"noopener\">How Ultrasonic Sound Tracks Your Activity Online<\/a>. Now it seems, the hidden voice commands can take control over our handhelds and home voice assistants.<\/p>\n<p>A group of scientists from Georgetown University and the University of California, Berkeley started their research when Amazon Echo hit the stores. Back then a voice control was just a geek playing toy. Now it constantly runs on every phone and home gadget like a smart TV or an interactive speaker. The meaning of the research they performed cannot be overestimated.<\/p>\n<p>The researchers registered a random URL and sent a command to open it. Downloading malware from a website is the most common way for it to spread. During this experiment both <a href=\"https:\/\/igotoffer.com\/blog\/google-assistant-digital-butler\" target=\"_blank\" rel=\"noopener\">Google Assistant<\/a> and <a href=\"https:\/\/igotoffer.com\/blog\/cortana-vs-siri\" target=\"_blank\" rel=\"noopener\">Siri <\/a>were tested.<\/p>\n<div id=\"attachment_7193\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-7193\" loading=\"lazy\" class=\"size-full wp-image-7193\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/hack-assistant-ultrasound-big.jpg\" alt=\"Hack Assistant Ultrasound\" width=\"600\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/hack-assistant-ultrasound-big.jpg 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/hack-assistant-ultrasound-big-300x200.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/hack-assistant-ultrasound-big-225x150.jpg 225w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-7193\" class=\"wp-caption-text\">Hackers Can Silently Control Voice Assistants Using Ultrasound<\/p><\/div>\n<p>The phones were trained by speaking \u2018Ok, Google\u2019 three times as the manual says. Then the researchers started to try to make them obey commands. Google Digital Assistant cracked almost immediately, Siri was a harder case. It gave in but with limited access to the iPhone.<\/p>\n<p>When I was first asked to write about this, I was really excited and decided to conduct an experiment of my own. I have two Android phones, both being two-year-old models with Android 6.0 aboard. My friend has an iPhone 6s with iOS 10.3.3.<\/p>\n<p>The first thing to do was to make sure the phone was locked, and then to see if it would respond to any of my voice commands. Both Android phones responded to \u2018OK, Google\u2019 and followed through with an internet search when I asked, but they required my fingerprint to unlock the screen and see the results. The locked phones were also able to open YouTube, notes, and contact lists, but I did have to unlock the phone in order to see any videos, notes or contacts. I was able to look up a contact, but could not dial until I unlocked my phone and proceeded.<\/p>\n<p>Then I recorded my voice and added some after effects to it. When I played the recording, my phone failed to recognize my voice! So&#8230;my phones aren\u2019t exactly flagship phones. Honestly, they are just budget models, and I don\u2019t think their microphones are too sensitive. But you know what? After this experiment I can almost say that is an asset!<\/p>\n<p>The locked iPhone reacted to \u2018Hey, Siri\u2019 and answered what time it was. But for any other action it asked to press the home button and to unlock with passcode or fingerprint. So we can be a little safer with Siri and Apple products than with the Google Home Assistant.<\/p>\n<p>The next question is how can cyber criminals reach your interactive speaker. The easiest way is to record a command and then insert it into a YouTube video. Then the video goes viral and their \u201chacking goal\u201d so to speak, is achieved. All the millions of people who watched that viral video got a small \u201cgift\u201d from the hackers. Does this intimidate you? It honestly shouldn\u2019t. It\u2019s not hard to not notice if all of a sudden your phone starts to open a site you did not instruct it to do so or one you did not click on. Especially google phones, usually they repeat their commands out loud after they performed them. So even if you happen to be watching a video with a hidden virus in it, you are holding it in your very hands and will instantly notice if a strange link starts to open up and can stop the phone from opening up this said virus.<\/p>\n<p>Another way to reach or hack an interactive speaker is very Hollywood-like to me. A hacker or a group of hackers have to hack a TV channel and add a hidden command to it. Then they have to make sure you specifically turn on the TV on that specific channel and watch this ad they hacked. Now\u2026 how likely is that to truly happen? Highly unlikely. Any sensible hacker would find a simpler and more effective way to hack your smart home system or phone. But I do think that the pranksters can appreciate the hole in this security system.<\/p>\n<p>I won\u2019t warn you about not using the \u201c Ok, Google\u201d command in public, because most of us don\u2019t really do it much anyway. For me personally, I just don\u2019t really want people to know what I am searching or looking for on my phone. What I do appreciate is a vocal password for the Home Assistant. For example, you can say \u201cOk, Google\u201d and then add \u201c Switch on the heating system, *insert password of choice here*\u201d Just make sure not to use your favorite pet&#8217;s name, just like the generic \u201c1-2-3-4\u201d passcodes, it is one of those passcodes hackers can easily uncode.<\/p>\n<p>OK, Google&#8230; close Word!<\/p>\n<h2>Links<\/h2>\n<ul>\n<li>If you want to get rid of your old device, you can always sell it online to <a href=\"https:\/\/igotoffer.com\" target=\"_blank\" rel=\"noopener\">iGotOffer.com<\/a>, the best place to trade in your old gadgets for top cash.<\/li>\n<li><a href=\"https:\/\/igotoffer.com\/apple\/\" target=\"_blank\" rel=\"noopener\">Everything About Apple\u2019s Products<\/a> &#8211; The complete guide to all Apple consumer electronic products, including technical specifications, identifiers and other valuable information.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>DolphinAttack: Inaudible Voice Command [Video] Video uploaded by guoming zhang on August 31, 2017 How They Can Hack Your Voice Assistant: Ultrasound Voice is what we use as our main control tool nowadays. We can easily operate our mobile devices vocally. It\u2019s a wonderful thing in the modern world, but also a dangerous one. Depending [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7194,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[460,434],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Hack Voice Assistant: Ultrasound | iGotOffer<\/title>\n<meta name=\"description\" content=\"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/voice-hack\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Hack Voice Assistant: Ultrasound | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/voice-hack\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-26T01:12:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-17T04:38:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/voice-hack#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg\",\"width\":600,\"height\":400,\"caption\":\"How to Hack Voice Assistants: Ultrasound\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/voice-hack#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/voice-hack\",\"name\":\"How to Hack Voice Assistant: Ultrasound | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/voice-hack#primaryimage\"},\"datePublished\":\"2017-09-26T01:12:53+00:00\",\"dateModified\":\"2023-11-17T04:38:03+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/voice-hack#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/voice-hack\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/voice-hack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Hack Voice Assistant: Ultrasound\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Hack Voice Assistant: Ultrasound | iGotOffer","description":"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/voice-hack","og_locale":"en_US","og_type":"article","og_title":"How to Hack Voice Assistant: Ultrasound | iGotOffer","og_description":"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.","og_url":"https:\/\/igotoffer.com\/blog\/voice-hack","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2017-09-26T01:12:53+00:00","article_modified_time":"2023-11-17T04:38:03+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/voice-hack#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/09\/how-to-hack-assistant-ultrasound.jpg","width":600,"height":400,"caption":"How to Hack Voice Assistants: Ultrasound"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/voice-hack#webpage","url":"https:\/\/igotoffer.com\/blog\/voice-hack","name":"How to Hack Voice Assistant: Ultrasound | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/voice-hack#primaryimage"},"datePublished":"2017-09-26T01:12:53+00:00","dateModified":"2023-11-17T04:38:03+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"Voice Hack: We can easily operate our mobile devices vocally. The problem is that hackers can silently control voice assistants using ultrasound.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/voice-hack#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/voice-hack"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/voice-hack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Hack Voice Assistant: Ultrasound"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7189"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=7189"}],"version-history":[{"count":3,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7189\/revisions"}],"predecessor-version":[{"id":14921,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7189\/revisions\/14921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/7194"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=7189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=7189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=7189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}