{"id":10465,"date":"2017-11-14T06:30:18","date_gmt":"2017-11-14T14:30:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4238\/"},"modified":"2017-11-14T06:30:18","modified_gmt":"2017-11-14T14:30:18","slug":"news-4238","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4238\/","title":{"rendered":"\u2018Hey Siri, buy $100 Bitcoin for the burglar guy\u2019"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/06\/apple-homepod-sensors-100725148-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 14 Nov 2017 06:08:00 -0800<\/strong><\/p>\n<p>Apple will apparently bring FaceID to its long-awaited <a href=\"https:\/\/www.apple.com\/uk\/homepod\/\" rel=\"nofollow\">HomePod smart speaker systems<\/a> next year, but voice assistant tech may be a weak link in domestic and enterprise security, fresh <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167639317300924?via%3Dihub\" rel=\"nofollow\">research<\/a> claims.<\/p>\n<p>Researchers at the <a href=\"https:\/\/www.uef.fi\/en\/etusivu\" rel=\"nofollow\">University of Eastern Finland<\/a> claim that voice impersonators can fool smart speaker systems into thinking they are an authorized user of those systems.<\/p>\n<p>It\u2019s known that you can undermine voice authorization systems using speech synthesis, voice conversion or even dubbing recordings of a target voice.<\/p>\n<p>While technology-based countermeasures to such attacks are constantly being developed, the Finnish research suggests that voice impersonators are much harder to protect against.<\/p>\n<p>\u201cSkilful voice impersonators are able to fool state-of-the-art speaker recognition systems, as these systems generally aren\u2019t efficient yet in recognising voice modifications,\u201d the researchers claim. This \u201cposes significant security concerns,\u201d they said.<\/p>\n<p>I think this is why Apple and others in the high-tech space have refrained from creating smartphones and other devices that recognize speech as a biometric ID.<\/p>\n<p>The study analysed speech from two professional impersonators. It found that impersonators were able to fool automatic systems and a panel of listeners.<\/p>\n<p>The study notes:<\/p>\n<p>\u201cIn the case of acted speech, a successful strategy for voice modification was to sound like a child, as both automatic systems\u2019 and listeners\u2019 performance degraded with this type of disguise.\u201d<\/p>\n<p>We\u2019ve had plenty of high-profile incidents in which security scares have been raised concerning use of non-Apple smart speaker systems. These always-on, always listening systems mean every user has a <a href=\"http:\/\/www.popularmechanics.com\/technology\/security\/news\/a26773\/apple-homepod-smart-speakers-microphone-privacy\/\" rel=\"nofollow\">permanent ear in their home<\/a>.<\/p>\n<p>The notion that these ears can be activated relatively easily by using a combination of imitation, voice disguise, or <a href=\"https:\/\/labs.mwrinfosecurity.com\/blog\/alexa-are-you-listening?utm_source=MIT+Technology+Review&amp;utm_campaign=5830cc4545-The_Download&amp;utm_medium=email&amp;utm_term=0_997ed6f472-5830cc4545-155954301\" rel=\"nofollow\">other means<\/a> suggests that when it comes to what those devices can do, users need to ensure payment and personal data demand additional security steps before being enabled.<\/p>\n<p>This was made clear fairly recently when a bunch of Amazon Echo devices began to order a child\u2019s toy once a TV station spoke the Echo keyword and told it to buy.<\/p>\n<p>That was a relatively easy to resolve flaw, but it\u2019s not particularly hard to imagine what might happen if someone gained access to your home, activated your smart speaker system and used that system to make a payment to an untraceable account, such as Bitcoin or Dash.<\/p>\n<p>That\u2019s a domestic threat, but it poses an even bigger threat to enterprise CIOs who may be considering investment in smart speaker systems such as these for some element of their business.<\/p>\n<p>It seems pretty clear that enabling smart systems like these to gain unfettered access to even a limited quantity of the data held by a company could pose some threat.<\/p>\n<p>In some enterprises, such a threat may even put a company in breach of regulated security protocols.<\/p>\n<p>In addition to which, anyone considering an investment in a smart speaker system needs to be 100 percent certain that they have absolute control of <a href=\"https:\/\/qz.com\/1044953\/an-amazon-echo-security-vulnerability-allows-hackers-to-spy-on-your-conversations\/\" rel=\"nofollow\">who is listening<\/a> to what they are saying at any time.<\/p>\n<p>You do not want a manufacturer holding onto recordings of your personal speech, and you do not want business competitors to undermine device security in hope of learning secrets about you or your business.<\/p>\n<p>It is also important to note that only Apple\u2019s HomePod anonymizes any recordings stored online of your transactions around the device.<\/p>\n<p>Both Amazon and Google link those recordings to <a href=\"https:\/\/www.cnet.com\/news\/homepod-echo-google-home-how-secure-are-your-speakers\/\" rel=\"nofollow\">your account<\/a>. This opens up another potential attack vector. (Apple deletes this data after six months, but it is never associated with your user ID).<\/p>\n<p>There is no real need to panic, of course. What matters is to ensure these systems are deployed securely. This means:<\/p>\n<p>We don\u2019t yet know all the details concerning how Apple plans to secure HomePod systems, but we will find out more when the $349 product ships in December 2017.\u00a0<\/p>\n<p>We recently learned that Apple will only offer <a href=\"https:\/\/developer.apple.com\/news\/?id=10302017a&amp;1509390421\" rel=\"nofollow\">limited support to third party apps<\/a> on launch. That\u2019s a good thing: It limits potential security risk and will change as threats are recognized and overcome over time. Your friendly voice imitating burglar will not be able to order themselves an Uber getaway car using your Apple device.<\/p>\n<p>We also know that SiriKit for HomePod <a href=\"https:\/\/developer.apple.com\/sirikit\/\" rel=\"nofollow\">relies<\/a> on a nearby iPhone or iPad to work. This suggests you\u2019ll need to first unlock the device from your iOS device before using it, which will make it a lot less vulnerable to voice mimic attacks.<\/p>\n<p>Developer <a href=\"https:\/\/twitter.com\/_inside\" rel=\"nofollow\">Guilherme Rambo<\/a> claims we will be able to define those who have access to HomePod controls: \u201c<em>people on the same network, only people sharing your home, everyone or only password-protected users<\/em>\u201d.<\/p>\n<p>Apple has been designing connected devices for long enough to learn the need to secure them. Face ID and Touch ID biometric authorization systems demand a passcode at critical times to support their use, for example.<\/p>\n<p>All the same, Apple does seem to be working to ensure that your HomePod system will not undermine your digital security. And that&#8217;s a really good thing.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3237285\/apple-ios\/hey-siri-buy-100-bitcoin-for-the-burglar-guy.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/06\/apple-homepod-sensors-100725148-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 14 Nov 2017 06:08:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple will apparently bring FaceID to its long-awaited <a href=\"https:\/\/www.apple.com\/uk\/homepod\/\" rel=\"nofollow\">HomePod smart speaker systems<\/a> next year, but voice assistant tech may be a weak link in domestic and enterprise security, fresh <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167639317300924?via%3Dihub\" rel=\"nofollow\">research<\/a> claims.<\/p>\n<h2><strong>The imitation game<\/strong><\/h2>\n<p>Researchers at the <a href=\"https:\/\/www.uef.fi\/en\/etusivu\" rel=\"nofollow\">University of Eastern Finland<\/a> claim that voice impersonators can fool smart speaker systems into thinking they are an authorized user of those systems.<\/p>\n<p>It\u2019s known that you can undermine voice authorization systems using speech synthesis, voice conversion or even dubbing recordings of a target voice.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3237285\/apple-ios\/hey-siri-buy-100-bitcoin-for-the-burglar-guy.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10480,10554,714],"class_list":["post-10465","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-ios","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10465"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10465\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}