this post was submitted on 03 Sep 2024
1118 points (96.6% liked)
Technology
59429 readers
3092 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Recent versions of Android make it much more difficult for a background app to access the microphone. There will be a notification if any background app is using the mic or camera.
Yeah, this sounds like a shareholder soapy titwank speech to me.
They're bullshitting everyone including the people we hate.
Google's "Now playing" feature constantly listens to what's going on in the background to show you what songs are playing. They claim this is done with a local database of song "fingerprints". The feature does not show the microphone indicator because: "...Now Playing is protected by Android's Private Compute Core..."
I'm not saying that other, non-google, app do this to my knowledge; but the fact that this is a thing is honestly a bit scary.
Edit: screenshot of the "Now Playing" feature
if this is used, or there is some whitelist that gives permission for background microphone use in voice interaction services, apps with tracking capabilities probably use some set of predefined keywords (hardcoded inside the app itself) and those can be triggered while being on standby/in background, when there is a match some pinging goes to outside servers...
The thing is I really can't see Google allowing anyone else access. They don't even allow Android OEMs to have access
For what it's worth, I did just test it with airplane mode and it still correctly identified the song playing. So at the very least, it's not lying about using a local database to identify songs, at least when it is offline.
It also uses a cloud fingerprint database apparently according to the second paragraph:
Oh, I didn't notice this, my apologies. Turning on identify songs nearby reveals two new options, notifications and show search button. That show search button option must be new; I had identify nearby music on already since my last phone. Guess they added something new. My bad.
Why is that scary to you?
What other apps use Google's "Android Private Compute Core" and therefore don't show mic or camera usage notifications? Not trying to sound all tinfoil hat here, but seriously: can apps other than those from Google use the "Android Private Compute Core"? Even if only Google's own apps can use the "Android Private Compute Core", we can't see the source code for Google's apps as (far as I know, anyway) they are not open source. If an app is not open source, we do not really know what the app is doing in the background; we'll just have to take them at their word.
Not to mention companies and their software (especially older versions) are commonly hacked. If there was a vulnerability, how long did my phone provide the hackers with unlimited access to those features to have them possibly try to extort me in real life.
I have seen said feature being mentioned or brought to other android versions whether with apps or modules, do they work the same way?
I'm not sure how other apps or android versions work. This is a flaw with the closed source software ecosystem.
Supposedly more difficult.
Android likes selling ads too, why would google want to stop ad blocking microphne access?
Yup, the green dot top right
Now if there was only an easy way to get to the offending app to identify it
Pull open quick settings and tap the dot.
Really? Thank you!
For Samsung at least, tapping the dot will tell you what's accessing what. I can't confirm if it works on other flavors of Android unfortunately.