This site may earn affiliate commissions from the links on this folio. Terms of utilise.

Near smartphones can answer to your voice commands, merely they might as well respond to someone else'due south. Researchers from French republic'south ANSSI information security agency has institute a way to make Apple's Siri and Google voice search respond to commands without talking to them. Information technology happens via radio waves and works upward to 16 feet away. This technique can be used to exploit the device in a number of means.

This clever hack relies upon the headphone jack, which has a microphone input on virtually all modern smartphones. The main limitation of the method adult by ANSSI is that the target device needs to have headphones with a mic plugged into the device. That's because the electromagnetic waves must utilise the cord as an antenna to access the mic input. The electric signals can be made to look like a user'south voice, thus activating Siri or Google.

With the vox commands listening, the radio waves tin can continue feeding signals into the mic that await to the phone like voice input. The researchers were able to use their system — based on an inexpensive open-source software GNU Radio, a USRP software-defined radio, an amplifier, and an antenna — to issue commands that sent the phone's browser to a specific website or placed a call. Y'all could use this to essentially turn a phone into a undercover listening device or straight it to a website with a software exploit. An assailant could too use these silent vox commands to send phishing messages from the user's e-mail or social accounts.

antenna

You don't necessarily need to panic and disable vocalism commands on your phone simply however. In improver to having headphones plugged in, you need to have voice commands enabled from the lock screen and sleep manner. If a telephone is awake, the user would probably notice something was amiss, subsequently all. This is the default setting for Siri on iPhones, but Android devices acquit differently. Yous have to manually plow on the "OK Google" hotword from any screen, and when y'all practice the phone tunes to your vocalism. After you've trained the phone in this manner, the radio waves would be unable to trigger the voice actions because they don't "sound" similar you. So, Siri is much more vulnerable than Google's vocalization search.

The 16 foot range of the hack is based on the laboratory setup used in the ANSSI test. If y'all wanted to make a mobile version of the rig that fits in a haversack, you'd probably only take enough power to hack a phone from six or seven feet away. That could withal be useful in a crowded space like a subway car. The larger version from the lab might fit in a car too.

The researchers have contacted Apple and Google to propose allowing users to create custom wake words, which would block this attack. Better shielding on headphone cables would also do the trick. Neither company has responded yet.