TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cracking Siri

526 pointsby nolanbrown23over 13 years ago

22 comments

Xuzzover 13 years ago
Using an almost amazingly simple procedure a few weeks ago, I worked a bit with @tmm1 on figuring most of this out. We actually got custom commands working via both proxy and on-device interposing based methods: <a href="http://mobile.twitter.com/tmm1/status/131520489049960449" rel="nofollow">http://mobile.twitter.com/tmm1/status/131520489049960449</a>
pflatsover 13 years ago
A little googling shows some interesting info about the ACE request/header. From skimming, it looks like a header compression method for VOIP on cell/lossy connections.<p>Slide deck: <a href="http://www-rn.informatik.uni-bremen.de/ietf/rohc/ace-033100-aus.pdf" rel="nofollow">http://www-rn.informatik.uni-bremen.de/ietf/rohc/ace-033100-...</a><p>Whitepaper: <a href="http://w3.ualg.pt/~bamine/B3.pdf" rel="nofollow">http://w3.ualg.pt/~bamine/B3.pdf</a>
leohover 13 years ago
Looks like guzzoni.apple.com is named after Didier Guzzoni (<a href="http://www.ai.sri.com/~guzzoni/" rel="nofollow">http://www.ai.sri.com/~guzzoni/</a>), an employee at SRI.<p>He's also listed on an interesting Apple patent that was only filed a few weeks ago, "INTELLIGENT AUTOMATED ASSISTANT"(<a href="http://www.wipo.int/patentscope/search/en/WO2011088053" rel="nofollow">http://www.wipo.int/patentscope/search/en/WO2011088053</a>).<p>Some very interesting implementation details there.
LeafStormover 13 years ago
I'm kinda wondering why Apple bothered using HTTP for something that really doesn't use anything recognizable as proper HTTP. Was it just for HTTPS?
评论 #3235700 未加载
评论 #3235674 未加载
评论 #3235655 未加载
jentulmanover 13 years ago
The question that springs to my mind is not 'how can I play with this?' but 'Are Apple bringing Siri to the desktop?', seeing as it appears there's nothing specific to the 4S hardware in how this works.<p>I'd quite like to be able to add calendar entries or tweet without moving to another application.
评论 #3236256 未加载
评论 #3236033 未加载
评论 #3236453 未加载
tamersalamaover 13 years ago
I wonder how Apple is taking all of this? Is Applidium risking their developer license?
评论 #3236856 未加载
spraveen80over 13 years ago
I didn't see anything in this article that mentions that the natural language understanding is done in the cloud. May be I am missing something, but I don't understand why everyone is jumping to the conclusion that the NLU is also done in the cloud and downvoting other's comments that said so.<p>From what I've seen, Siri sends compressed audio to the cloud which translates that to text. What happens to the text and how does that translate to action? Where is this being handled? Is there any proof that this is done in the cloud?
cjohover 13 years ago
It'd be interesting to see whether or not Apple changed the Siri protocol since the acquisition. Was this originally how Siri worked when it was independent?<p>Because Siri has roots in government contracting (it's named after SRI International, and was originally funded by DARPA) I wonder if the roots of the obfuscation start there rather than at Apple.
评论 #3236053 未加载
评论 #3236277 未加载
MatthewPhillipsover 13 years ago
Cannot upvote this enough. Stuff like this is the reason I read HN.
jakubwover 13 years ago
I wonder if there are any characteristics about the microphone in Apple devices that the servers could check the audio against to prevent this sort of a thing. There should be a way to somewhat distinguish the device used to record a stream given Apple's control over the devices on which Siri runs and overcoming that would be hard enough for anyone to bother.
评论 #3235830 未加载
pdenyaover 13 years ago
Really interesting. I'm curious what their tools look like but the github repository the article links to is currently empty.
评论 #3235658 未加载
victoknightover 13 years ago
&#60;spolier&#62; guess who doesn't verify the root CA. Think of all the fun to be had with a Siri man-in-the-middle
评论 #3235753 未加载
评论 #3237368 未加载
评论 #3235681 未加载
mbqover 13 years ago
Anyway, this is a proof that siri is a pure cloud service and as such may work even on 5-yo Sagem...
评论 #3236127 未加载
achompasover 13 years ago
I would LOVE to backward-engineer Siri's speech-analysis algorithms. Confidence scores help, but it doesn't look like any other modeling data is available?
评论 #3242631 未加载
mirkulesover 13 years ago
Is there a possibility to craft a Siri server reply with malicious code? Shouldn't be too hard for the applidium guys to attempt (maybe even use a fuzzer?)
评论 #3235660 未加载
tucsonover 13 years ago
"Seems like someone at Apple missed something!"<p>What did Apple miss? (in other words: how could they avoid this, assuming they wanted to avoid such crack)
jasonkolbover 13 years ago
I love reading investigative coding stories. Always fun to take a peek into secret--especially high-profile--code.<p>Thanks!
aritraghosh007over 13 years ago
The remote server is located at apple-compu.car1.charlotte1.level3.net.
signa11over 13 years ago
can the server-side be a watson like computer cluster ? just curious...
_hnwoover 13 years ago
down for me :(
评论 #3235715 未加载
hc5over 13 years ago
&#62; The iPhone 4S sends identifiers everywhere.<p>So if I'm reading this right, Apple is sending UDIDs over HTTP?
评论 #3236099 未加载
评论 #3236697 未加载
评论 #3236093 未加载
Volpeover 13 years ago
No one is at all concerned that this is a hack?<p>I know it's interesting stuff, but I'm curious what "rights" Applidium have in publishing this information.<p>With this information, (if I'm not wrong) it wouldn't take long to simply DDoS Siri...<p>Or port Siri to Android (effectively stealing IP).<p>(I have no bias either way, just pointing out, if someone figured out how to reverse engineer dropbox, so you could use their space, without a dropbox account, would we all be going "wow, this is so cool!" or would we be crying out "this is such an irresponsible hack!")
评论 #3236361 未加载
评论 #3236565 未加载
评论 #3240074 未加载
评论 #3236473 未加载
评论 #3236493 未加载