The Science of Inaudible Voice Hacking
The Hated One The Hated One
431K subscribers
74,378 views
0

 Published On Feb 6, 2022

Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine.
Support me through Patreon:   / thehatedone  
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp
Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689
Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources

Your Phone Is Listening - Ultrasonic Cross-Device Tracking
   • Your Phone Is Listening - Ultrasonic ...  

Hidden Audio Commands
https://www.nytimes.com/2018/05/10/te...
Burger King TV Ad Trolling Google Home
https://www.nytimes.com/2017/04/12/bu...

Ultrasonic Voice Commands
https://www.bbc.com/news/technology-4...
https://www.scientificamerican.com/ar...

Voice Obfuscation & Psychoacoustics
https://www.usenix.org/conference/woo...
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
https://www.usenix.org/system/files/c...
Psychoacoustics
https://adversarial-attacks.net/
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
https://www.ndss-symposium.org/ndss-p...
Alexa Can Be Hacked By Chirping Birds
https://www.fastcompany.com/90240975/...

Alexa Skills Hacking
https://www.wired.com/story/amazon-ec...
https://news.ncsu.edu/2021/03/alexa-s...

Voice Squatting
https://www.forbes.com/sites/thomasbr...

DolphinAttack
Animal Frequency Hearing Range
https://en.wikipedia.org/wiki/File:An...
https://www.fastcompany.com/90139019/...
Research Papers
DolphinAttack: Inaudible Voice Commands
https://dl.acm.org/doi/10.1145/313395...
Inaudible Voice Commands: The Long-Range Attack and Defense
https://www.usenix.org/conference/nsd...
Inaudible Voice Commands
https://arxiv.org/pdf/1708.07238.pdf
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves
https://surfingattack.github.io/paper...
https://surfingattack.github.io/
SurfingAttack
https://nakedsecurity.sophos.com/2020...

Ultrasonic Cross-Device Tracking
https://arstechnica.com/tech-policy/2...
Ultrasonic Beacons
https://www.wired.com/2016/11/block-u...
https://techcrunch.com/2014/07/24/sil...
https://www.campaignlive.com/article/...
Ultrasonic Cross-Device Transmission
https://www.sciencedirect.com/science...

Light Commands (Laser Hacking)'
https://www.nytimes.com/2019/11/04/te...
https://lightcommands.com/

Credits
Musci By: White Bat Audio    / whitebataudio  

Follow me:
  / the_hatedone_  
https://www.bitchute.com/TheHatedOne/
  / thehatedone  
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

show more

Share/Embed