Apple Siri contractors often hear up to 30 seconds of accidental recordings
Apple has been open about the fact that it screens some Siri recordings to improve the AI assistant’s ability to “understand you better and recognize what you say.” But there are more of these recordings — notably accidental ones — than most customers realize, The Guardian reports, and they’re being heard by human contractors with high turnover rates, not just internal Apple teams. Worse yet, a whistleblower says that the recordings often contain highly private details that could be used to identify and compromise Apple’s users.
According to the report, the key issue is that Siri can be accidentally triggered by audio cues, including anything from the sound of a zipper to the word “Syria,” as well as gestures such as raising an Apple Watch on a certain angle. These inadvertent activations aren’t just frequent; on the Watch, they also lead to 30-second long recordings, some fraction of which are shared with Apple’s contractors for analysis, where they “can gather a good idea of what’s going on.”
The snippets have allegedly included “countless instances” of discussions between doctors and patients, sexual encounters, business deals, and criminal activities such as drug deals, accompanied by the user’s location, contact details, and app data. While contractors aren’t specifically listening for private activities in the recordings, the whistleblower claims that Apple doesn’t do “much vetting of who works there, and the amount of data that we’re free to look through seems quite broad … If there were someone with nefarious intentions, it wouldn’t be hard to identify [people on the recordings].”
Compounding the issue, Siri responds to the question “are you always listening?” by saying “I only listen when you’re talking to me,” providing a false sense of security regarding accidental activations. The most frequent accidental recordings come from Apple Watches and HomePod speakers, the whistleblower said, without specifying ratios for Apple’s other devices, such as iPhones, iPads, and Apple TVs.
Asked for comment, Apple suggested that the requests aren’t associated with the user’s Apple ID, and claimed that Siri responses are analyzed in “secure facilities” by reviewers who are all “under the obligation to adhere to Apple’s strict confidentiality requirements.” The company said that only a random subset of under 1% of daily Siri activations are used for accuracy grading — a number that could be massive, given that there are at least 500 million Siri devices out there — and most recordings are only a few seconds long.
Apple has positioned itself as the world’s most privacy-conscious tech giant, in recent months marketing its devices as particularly secure with users’ personal data. In January, it launched a gigantic billboard at CES under the theme “what happens on your iPhone, stays on your iPhone,” and representatives have portrayed the company as wholly disinterested in what’s on users’ devices — apart from keeping their content safe from unwanted inspection. The company also explicitly said last year that iPhones aren’t spying on users, though bugs in its FaceTime Audio system have twice enabled other users to surreptitiously hear private conversations in the vicinity of iPhones
Industry: Cyber Security
- Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project, £75,000+
- United Kingdom
Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project DCL Search exclusive Identifier Project. To join a financial services business. Key hire to be part of / influence the cyber security capability and direction within the business. Hands on experience managing / monitoring / upgrading / implementing / using the following; · Firewalls: SonicWall and or Palo Alto · NAC: Cisco OR Macmon · WAF | CASB | MDM Experience with SIEM monitoring / vulnerability analysis also highly desirable. MUST have current hands on experience with vulnerability management tooling and best practice. Current Financial services is a nice to have. Learn new skills working within a collaborative team. Grow as a security professional.
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.