Android
The new home of /r/Android on Lemmy and the Fediverse!
Android news, reviews, tips, and discussions about rooting, tutorials, and apps.
πUniversal Link: !android@lemdro.id
π‘Content Philosophy:
Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.
Support, technical, or app related questions belong in: !askandroid@lemdro.id
For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id
π¬Matrix Chat
π°Our communities below
Rules
-
Stay on topic: All posts should be related to the Android OS or ecosystem.
-
No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.
-
Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.
-
No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.
-
No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.
-
No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.
-
No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.
-
No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.
-
No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!
-
No affiliate links: Posting affiliate links is not allowed.
Quick Links
Our Communities
- !askandroid@lemdro.id
- !androidmemes@lemdro.id
- !techkit@lemdro.id
- !google@lemdro.id
- !nothing@lemdro.id
- !googlepixel@lemdro.id
- !xiaomi@lemdro.id
- !sony@lemdro.id
- !samsung@lemdro.id
- !galaxywatch@lemdro.id
- !oneplus@lemdro.id
- !motorola@lemdro.id
- !meta@lemdro.id
- !apple@lemdro.id
- !microsoft@lemdro.id
- !chatgpt@lemdro.id
- !bing@lemdro.id
- !reddit@lemdro.id
Lemmy App List
Chat and More
view the rest of the comments
I do not see why everyone wants to deny this and trust big tech. After you lot completely brainwashed?? Assume the worst, that malicious applications are recording both your microphone and your camera, and do the best you can. Anyone even taking Meta's/Google's side here is absurd to me.
It's surprisingly easy to use adtech without voice and make a connection to serve a targeted ad. Had a friend ask me about what I was drinking. They were on my guest wifi network. They searched for it. Next day, I'm getting ads because of geoIP pinned my IP address as having an interest.
Also had someone that lives off the grid with no active network or devices watch a DVD of a movie and the entirety of their Internet connectivity was two cell phones in the room. They started seeing things related to the movie. They're older and not constantly on their phones. The phones just sit somewhere in the room.
Had a discussion with some tech friends a few years back and remarked that keeping awake to do this would take a lot of power. The EE mentioned running audio recording would take basically nothing. I expanded from there, the device uploads audio for off-phone translation to text, or queues batch jobs to process locally when power is high enough or on charger. Etc.
It is 100% probable that code runs on phones and just ships off amalgamated text frequency charts or entire conversations and the user won't even notice the battery dent.
That being said, I can't find even in the greediest capitalist money-claw that the person giving a go would not think, "well, I can't trust my own device anymore..." and maybe go: "yeah, I shouldn't do this." Maybe I'm too optimistic though.
How do you think your friend in the woods got the advertisements?
And yes, I still think you're too trusting of Big Tech. They are 100 times more vile than you think they are. THEY WILL do everything they can, and this is nothing to them.
The funny part is nobody wants to believe me and instead want to trust for-profit companies for their supposed pinkie-promises. Oh well, they'll learn in time.
My best guess is that I know one of them uses Facebook. Apple phones. Facebook, Uber, and a few others have had pretty deep access to APIs not accessible to other software companies. Sometimes they're caught like when Uber was caught using a screen scraping API. Sometimes they aren't. The other guess that glues it together is that Facebook has indeed scraped audio to text for a long time. It was almost 10 years ago that I had the EE conversation.
Google and Meta pay Apple money to gain access to their user metrics. It's likely symbiotic relationships. Facebook once had hooks directly in iOS. Likewise, the little mic/video indicators the OS displays when they are "active" are completely software-controlled and can be overridden.
At a time, I worked at a company that had(has) deep access to other aspects of iOS. Apple always required the source code is available to them so they could inspect it. I doubt that has changed. It also means they would be complicit. External tools wouldn't really be able to figure this out. For someone to black-box this they'd need a jailbroken iPhone and some specialized tooling or MITM decryption capabilities.
Not to sound hyperbolic, I'm connecting dots with no evidence, it's pure speculation. The compute seems to be there and with no regulation in source code, anything goes, if you want money bad enough. Especially with the mad dash every tech company has been on for the last 20ish years to harvest everything they can, ever since smartphones became powerful and commonplace enough.
Exactly. People should read your comment before shouting at me for not providing "proof". They seem incapable to understand that Big Tech can be smarter and more resourceful than a lot of security engineers
Why would anyone believe you? You have provided zero evidence to support anything you've said here.
This is the exact same logic conspiracy theorists use with aliens - "everyone wants to deny they exists and trusts the government, are you guys brainwashed????!!!!!".
Where is your proof this technology exists and is currently being used? The 404 media articles are not proof of either of these things. They are proof that CMG has some marketing slides and a former web page claiming that they have the capability to do this. They are proof that CMG has contacted at least one other company and tried to sell them this alleged service. They are not proof that the technology is being used, or that it even exists.
It's so ironic that you claim we are the brainwashed ones for demanding proof, yet you naively assume that CMG must really have developed this technology and employed it worldwide just because they said so. No one would ever lie about the capabilities of their company to inflate its worth and make more money! Only bad big tech lies, everyone else in the world is 100% honest!