Smashing Security cover image

The Nigerian supercop and Alexa vs. Alexa

Smashing Security

00:00

Is This a Proof of Concept Exploitation?

Alexa and echo devices have built in technology called keyword spotting. They are listening to the acoustic pattern of the wake word, which normally is a echo or alexa. Any other sound waves other than your chosen wake word would be ignored. The proof of concept exploit actually uses the devices very own speaker to issue voice commands.

Play episode from 14:19
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app