Y

YouLibs

Remove Touch Overlay

The Science of Inaudible Voice Hacking

Duration: 15:02Views: 61.9KLikes: 4.9KDate Created: Feb, 2022

Channel: The Hated One

Category: Science & Technology

Description: Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine. Support me through Patreon: patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Your Phone Is Listening - Ultrasonic Cross-Device Tracking youtube.com/watch?v=j1FfVK6sj4I Hidden Audio Commands nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html Burger King TV Ad Trolling Google Home nytimes.com/2017/04/12/business/burger-king-tv-ad-google-home.html? Ultrasonic Voice Commands bbc.com/news/technology-41188557 scientificamerican.com/article/ultrasonic-attack-device-hacks-phones-through-solid-objects Voice Obfuscation & Psychoacoustics usenix.org/conference/woot15/workshop-program/presentation/vaidya Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition usenix.org/system/files/conference/woot15/woot15-paper-vaidya.pdf Psychoacoustics adversarial-attacks.net Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding Alexa Can Be Hacked By Chirping Birds fastcompany.com/90240975/alexa-can-be-hacked-by-chirping-birds Alexa Skills Hacking wired.com/story/amazon-echo-alexa-skill-spying news.ncsu.edu/2021/03/alexa-skill-vulnerabilities Voice Squatting forbes.com/sites/thomasbrewster/2018/05/16/amazon-echo-google-home-voice-squatting-attack-exposes-devices DolphinAttack Animal Frequency Hearing Range en.wikipedia.org/wiki/File:Animal_hearing_frequency_range.svg fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa Research Papers DolphinAttack: Inaudible Voice Commands dl.acm.org/doi/10.1145/3133956.3134052 Inaudible Voice Commands: The Long-Range Attack and Defense usenix.org/conference/nsdi18/presentation/roy Inaudible Voice Commands arxiv.org/pdf/1708.07238.pdf SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves surfingattack.github.io/papers/NDSS-surfingattack.pdf surfingattack.github.io SurfingAttack nakedsecurity.sophos.com/2020/03/02/siri-and-google-assistant-hacked-in-new-ultrasonic-attack Ultrasonic Cross-Device Tracking arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc Ultrasonic Beacons wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking techcrunch.com/2014/07/24/silverpush-audio-beacons campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 Ultrasonic Cross-Device Transmission sciencedirect.com/science/article/pii/S2214212619304697 Light Commands (Laser Hacking)' nytimes.com/2019/11/04/technology/digital-assistant-laser-hack.html lightcommands.com Credits Musci By: White Bat Audio youtube.com/c/WhiteBatAudio Follow me: twitter.com/The_HatedOne_ bitchute.com/TheHatedOne reddit.com/r/thehatedone minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Swipe Gestures On Overlay