Apple Siri contractors often hear up to 30 seconds of accidental recordings
Apple has been open about the fact that it screens some Siri recordings to improve the AI assistant’s ability to “understand you better and recognize what you say.” But there are more of these recordings — notably accidental ones — than most customers realize, The Guardian reports, and they’re being heard by human contractors with high turnover rates, not just internal Apple teams. Worse yet, a whistleblower says that the recordings often contain highly private details that could be used to identify and compromise Apple’s users.
According to the report, the key issue is that Siri can be accidentally triggered by audio cues, including anything from the sound of a zipper to the word “Syria,” as well as gestures such as raising an Apple Watch on a certain angle. These inadvertent activations aren’t just frequent; on the Watch, they also lead to 30-second long recordings, some fraction of which are shared with Apple’s contractors for analysis, where they “can gather a good idea of what’s going on.”
The snippets have allegedly included “countless instances” of discussions between doctors and patients, sexual encounters, business deals, and criminal activities such as drug deals, accompanied by the user’s location, contact details, and app data. While contractors aren’t specifically listening for private activities in the recordings, the whistleblower claims that Apple doesn’t do “much vetting of who works there, and the amount of data that we’re free to look through seems quite broad … If there were someone with nefarious intentions, it wouldn’t be hard to identify [people on the recordings].”
Compounding the issue, Siri responds to the question “are you always listening?” by saying “I only listen when you’re talking to me,” providing a false sense of security regarding accidental activations. The most frequent accidental recordings come from Apple Watches and HomePod speakers, the whistleblower said, without specifying ratios for Apple’s other devices, such as iPhones, iPads, and Apple TVs.
Asked for comment, Apple suggested that the requests aren’t associated with the user’s Apple ID, and claimed that Siri responses are analyzed in “secure facilities” by reviewers who are all “under the obligation to adhere to Apple’s strict confidentiality requirements.” The company said that only a random subset of under 1% of daily Siri activations are used for accuracy grading — a number that could be massive, given that there are at least 500 million Siri devices out there — and most recordings are only a few seconds long.
Apple has positioned itself as the world’s most privacy-conscious tech giant, in recent months marketing its devices as particularly secure with users’ personal data. In January, it launched a gigantic billboard at CES under the theme “what happens on your iPhone, stays on your iPhone,” and representatives have portrayed the company as wholly disinterested in what’s on users’ devices — apart from keeping their content safe from unwanted inspection. The company also explicitly said last year that iPhones aren’t spying on users, though bugs in its FaceTime Audio system have twice enabled other users to surreptitiously hear private conversations in the vicinity of iPhones
source venturebeat
Industry: Cyber Security

Latest Jobs
-
- IAM Consultant- One Identity Manager- UK Wide
- Manchester
- Upto £75,000 plus excellent benefits
-
One Identity IAM consultant is needed for this expanding UK based business, you will be responsible for: Developing and Supporting the Identity and Access management system based-on One Identity products Active Roles Server and Identity Manager. Further develop One Identity Manager’s integration with Service Now to provide automated JML processes and application access requests and fulfilment. Work across the business ensuring that the IAM solutions integrates into both the technology and business systems and processes, ideally automating as mush as possible. Work with the Governance Risk & Compliance (GRC) team to provide application access attestations and toxic combination alerting and reporting. Work on a mixture of IAM related projects to help to integrate new ideas and technology into the business to ensure the business stays fully compliant Assist in ensuring that all IAM capabilities are mapped to internal processes, policies, and standards. Develop metrics to measure and improve and also compile reports around the solution If you are interested in this opportunity we are looking for someone who is skilled within Identity Acess management, you will need to have worked with the One Identity product, ideally both Active Roles Server and Identity Manager Experience in managing and integrating with Microsoft systems (on-premise and cloud), such as Active Directory, Exchange, Office, SharePoint, etc.
-
- SailPoint Integration Consultant
- Unknown
- Upto £75000 plus benefits
-
SailPoint Integration Consultant. SailPoint Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced SailPoint Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of Sailpoint domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex Sailpoint deployments.
-
- CyberArk Integration Consultant
- Greater London
- upto 75,000 plus benefits
-
CyberArk Integration Consultant. CyberArk Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced CyberArk Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of CyberArk domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex CyberArk deployments.
-
- Penetration Tester, UK based. Ability to achieve SC clearance
- United Kingdom
- 55000
-
Experienced Penetration tester- UK based with the ability to achieve SC clearance. On-going training and development and paid certifications / renewals. Interested to hear from all areas of penetration testing, web app, infrastructure, mobile, etc. MUST have current hands on experience delivering penetration testing. Ideally from a consultancy background with experience working with multiple clients. OSCP / CREST / CHECK / Tigerscheme penetration testing experience / certifications desirable. Apply today for more details. All information kept in the strictest of confidence.