• liveinthisworld@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    2
    ·
    2 months ago

    How do you think your friend in the woods got the advertisements?

    And yes, I still think you’re too trusting of Big Tech. They are 100 times more vile than you think they are. THEY WILL do everything they can, and this is nothing to them.

    The funny part is nobody wants to believe me and instead want to trust for-profit companies for their supposed pinkie-promises. Oh well, they’ll learn in time.

    • skuzz@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 months ago

      My best guess is that I know one of them uses Facebook. Apple phones. Facebook, Uber, and a few others have had pretty deep access to APIs not accessible to other software companies. Sometimes they’re caught like when Uber was caught using a screen scraping API. Sometimes they aren’t. The other guess that glues it together is that Facebook has indeed scraped audio to text for a long time. It was almost 10 years ago that I had the EE conversation.

      Google and Meta pay Apple money to gain access to their user metrics. It’s likely symbiotic relationships. Facebook once had hooks directly in iOS. Likewise, the little mic/video indicators the OS displays when they are “active” are completely software-controlled and can be overridden.

      At a time, I worked at a company that had(has) deep access to other aspects of iOS. Apple always required the source code is available to them so they could inspect it. I doubt that has changed. It also means they would be complicit. External tools wouldn’t really be able to figure this out. For someone to black-box this they’d need a jailbroken iPhone and some specialized tooling or MITM decryption capabilities.

      Not to sound hyperbolic, I’m connecting dots with no evidence, it’s pure speculation. The compute seems to be there and with no regulation in source code, anything goes, if you want money bad enough. Especially with the mad dash every tech company has been on for the last 20ish years to harvest everything they can, ever since smartphones became powerful and commonplace enough.

      • liveinthisworld@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        Exactly. People should read your comment before shouting at me for not providing “proof”. They seem incapable to understand that Big Tech can be smarter and more resourceful than a lot of security engineers

    • atrielienz@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Nobody wants to believe me (a random person on the internet who has provided no proof whatsoever of their own that can be replicated in any way by a credible source, over actual investigative journalists and security experts who have been actively looking for such a thing to validate it and have found nothing after years of these allegations). Hmm. I wonder why that is.

    • Ilandar@aussie.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Why would anyone believe you? You have provided zero evidence to support anything you’ve said here.