Viewing a single comment thread. View all comments

trumpcovfefe t1_j7b3i9h wrote

Any speaker connected to a network ** figured that'd be an obvious requirement

2

nitrohigito t1_j7b49mr wrote

see my second point then

1

trumpcovfefe t1_j7b4sbr wrote

2

nitrohigito t1_j7b5drx wrote

That friendly write-up features zero mentions of any kind of hacking.

2

trumpcovfefe t1_j7b5y97 wrote

Yeah thats on the friendly version. The article write up including gov use goes over that.

I'll look for it later, its been years. The original idea was for the gov to use this to hack into systems in buildings to rescue hostages.

Similar to using heat pattern imaging systems to see where people are in a room before breaching, but the echo location allows for it to be done in larger spaces and through denser walls.

Im going back to sleep for now. Cheers

2

nitrohigito t1_j7bb18w wrote

I'm sure state actors can hack a breadth of devices to achieve such a goal, was just meaning to point out that while cyberattacks tend to be highly scalable, there's enough variation across devices like this that you still need to be moderately lucky and put in some serious work hours to be able to pull this off. It's definitely not a "they just go an' haxx all devices in der" type deal, and it's needlessly alarmist to claim so.

There's also a number of other imaging techniques they can reach for. You mentioned infrared, but they can even use something like WiFi to image behind a wall. All much more circumstance-agnostic and cheap than having to build and maintain an assortment of exploit chains merely for use on a short-notice for echolocation.

If any group has such capabilities developed, they almost certainly use it much more practically (such as for surveillance). And those exploit chains won't be developed by "MIT scientists" who can certainly find a better way to spend their valuable time.

0