<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Silent attacks against voice assistants</title>
	<atom:link href="http://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 08:36:31 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Fluix Software</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1704622</link>
		<dc:creator><![CDATA[Fluix Software]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 15:49:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1704622</guid>
		<description><![CDATA[The new attack exploits the non-linear nature of MEMS microphone circuits to transmit harmful ultrasonic signals. To do this, the experts used a simple $ 5 piezoelectric transducer that was attached to the tabletop. To hide what was happening from the victim, the researchers adjusted the volume of the attacked device&#039;s responses using a directed ultrasonic command, but they themselves were still able to record the assistant&#039;s voice responses through a hidden &quot;bug&quot; located under the table.]]></description>
		<content:encoded><![CDATA[<p>The new attack exploits the non-linear nature of MEMS microphone circuits to transmit harmful ultrasonic signals. To do this, the experts used a simple $ 5 piezoelectric transducer that was attached to the tabletop. To hide what was happening from the victim, the researchers adjusted the volume of the attacked device&#8217;s responses using a directed ultrasonic command, but they themselves were still able to record the assistant&#8217;s voice responses through a hidden &#8220;bug&#8221; located under the table.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1672035</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Mar 2020 17:36:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1672035</guid>
		<description><![CDATA[SurfingAttack Sends Ultrasonic Commands to Phones, Smart Speakers Through the Table Surface
https://www.hackster.io/news/surfingattack-sends-ultrasonic-commands-to-phones-smart-speakers-through-the-table-surface-a17945abcd0f

By transmitting commands through the surface of a table, researchers have successfully attacked voice assistants without detection.]]></description>
		<content:encoded><![CDATA[<p>SurfingAttack Sends Ultrasonic Commands to Phones, Smart Speakers Through the Table Surface<br />
<a href="https://www.hackster.io/news/surfingattack-sends-ultrasonic-commands-to-phones-smart-speakers-through-the-table-surface-a17945abcd0f" rel="nofollow">https://www.hackster.io/news/surfingattack-sends-ultrasonic-commands-to-phones-smart-speakers-through-the-table-surface-a17945abcd0f</a></p>
<p>By transmitting commands through the surface of a table, researchers have successfully attacked voice assistants without detection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1666320</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Dec 2019 16:54:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1666320</guid>
		<description><![CDATA[Light Commands can hack voice assistants and other smart devices using a laser beam to target their MEMS-based mic using inaudible commands.

Researchers Use Laser Light Commands to Hack Smart Devices
https://www.hackster.io/news/researchers-use-laser-light-commands-to-hack-smart-devices-1937ab96e332

Light Commands can hack voice assistants and other smart devices using a laser beam to target their MEMS-based mic using inaudible commands.]]></description>
		<content:encoded><![CDATA[<p>Light Commands can hack voice assistants and other smart devices using a laser beam to target their MEMS-based mic using inaudible commands.</p>
<p>Researchers Use Laser Light Commands to Hack Smart Devices<br />
<a href="https://www.hackster.io/news/researchers-use-laser-light-commands-to-hack-smart-devices-1937ab96e332" rel="nofollow">https://www.hackster.io/news/researchers-use-laser-light-commands-to-hack-smart-devices-1937ab96e332</a></p>
<p>Light Commands can hack voice assistants and other smart devices using a laser beam to target their MEMS-based mic using inaudible commands.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1666237</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 27 Dec 2019 16:03:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1666237</guid>
		<description><![CDATA[All of us knew this was possible.  

Breaking Into a Smart Home With A Laser - Smarter Every Day 229
https://m.youtube.com/watch?feature=youtu.be&amp;v=ozIKwGt38LQ


This work was performed by a team of researchers at the University of Michigan and University of Electro-Communications in Japan. For more information check out their website http://lightcommands.com]]></description>
		<content:encoded><![CDATA[<p>All of us knew this was possible.  </p>
<p>Breaking Into a Smart Home With A Laser &#8211; Smarter Every Day 229<br />
<a href="https://m.youtube.com/watch?feature=youtu.be&#038;v=ozIKwGt38LQ" rel="nofollow">https://m.youtube.com/watch?feature=youtu.be&#038;v=ozIKwGt38LQ</a></p>
<p>This work was performed by a team of researchers at the University of Michigan and University of Electro-Communications in Japan. For more information check out their website <a href="http://lightcommands.com" rel="nofollow">http://lightcommands.com</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1665568</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 22 Dec 2019 19:51:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1665568</guid>
		<description><![CDATA[https://news.umich.edu/a-laser-pointer-could-hack-your-voice-controlled-virtual-assistant/

Researchers identified a vulnerability that allows a microphone to &#039;unwittingly listen to light as if it were sound&#039;]]></description>
		<content:encoded><![CDATA[<p><a href="https://news.umich.edu/a-laser-pointer-could-hack-your-voice-controlled-virtual-assistant/" rel="nofollow">https://news.umich.edu/a-laser-pointer-could-hack-your-voice-controlled-virtual-assistant/</a></p>
<p>Researchers identified a vulnerability that allows a microphone to &#8216;unwittingly listen to light as if it were sound&#8217;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/18/silent-attacks-against-voice-assistants/comment-page-1/#comment-1664989</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 19 Dec 2019 05:17:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185274#comment-1664989</guid>
		<description><![CDATA[Jamming the people
https://www.wired.com/2012/03/japanese-speech-jamming-gun/]]></description>
		<content:encoded><![CDATA[<p>Jamming the people<br />
<a href="https://www.wired.com/2012/03/japanese-speech-jamming-gun/" rel="nofollow">https://www.wired.com/2012/03/japanese-speech-jamming-gun/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
