Post AULT0yaCcTPRTjuLWy by dethos@s.ovalerio.net
 (DIR) More posts by dethos@s.ovalerio.net
 (DIR) Post #AULT0yaCcTPRTjuLWy by dethos@s.ovalerio.net
       2023-04-05T10:09:37Z
       
       0 likes, 0 repeats
       
       "The attacks work by modulating voice commands into near-ultrasound inaudible signals so that humans can't hear them but the voice assistant will still respond to them. These signals are then embedded into a carrier, such as an app or YouTube video. When a vulnerable device picks up the carrier, it ends up obeying the hidden embedded commands."https://www.theregister.com/2023/04/04/siri_alexa_cortana_google_nuit/#security #voiceassistants #siri #alexa #cortana #googleassistant