TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cracking Siri

526 点作者 nolanbrown23超过 13 年前

22 条评论

Xuzz超过 13 年前
Using an almost amazingly simple procedure a few weeks ago, I worked a bit with @tmm1 on figuring most of this out. We actually got custom commands working via both proxy and on-device interposing based methods: <a href="http://mobile.twitter.com/tmm1/status/131520489049960449" rel="nofollow">http://mobile.twitter.com/tmm1/status/131520489049960449</a>
pflats超过 13 年前
A little googling shows some interesting info about the ACE request/header. From skimming, it looks like a header compression method for VOIP on cell/lossy connections.<p>Slide deck: <a href="http://www-rn.informatik.uni-bremen.de/ietf/rohc/ace-033100-aus.pdf" rel="nofollow">http://www-rn.informatik.uni-bremen.de/ietf/rohc/ace-033100-...</a><p>Whitepaper: <a href="http://w3.ualg.pt/~bamine/B3.pdf" rel="nofollow">http://w3.ualg.pt/~bamine/B3.pdf</a>
leoh超过 13 年前
Looks like guzzoni.apple.com is named after Didier Guzzoni (<a href="http://www.ai.sri.com/~guzzoni/" rel="nofollow">http://www.ai.sri.com/~guzzoni/</a>), an employee at SRI.<p>He's also listed on an interesting Apple patent that was only filed a few weeks ago, "INTELLIGENT AUTOMATED ASSISTANT"(<a href="http://www.wipo.int/patentscope/search/en/WO2011088053" rel="nofollow">http://www.wipo.int/patentscope/search/en/WO2011088053</a>).<p>Some very interesting implementation details there.
LeafStorm超过 13 年前
I'm kinda wondering why Apple bothered using HTTP for something that really doesn't use anything recognizable as proper HTTP. Was it just for HTTPS?
评论 #3235700 未加载
评论 #3235674 未加载
评论 #3235655 未加载
jentulman超过 13 年前
The question that springs to my mind is not 'how can I play with this?' but 'Are Apple bringing Siri to the desktop?', seeing as it appears there's nothing specific to the 4S hardware in how this works.<p>I'd quite like to be able to add calendar entries or tweet without moving to another application.
评论 #3236256 未加载
评论 #3236033 未加载
评论 #3236453 未加载
tamersalama超过 13 年前
I wonder how Apple is taking all of this? Is Applidium risking their developer license?
评论 #3236856 未加载
spraveen80超过 13 年前
I didn't see anything in this article that mentions that the natural language understanding is done in the cloud. May be I am missing something, but I don't understand why everyone is jumping to the conclusion that the NLU is also done in the cloud and downvoting other's comments that said so.<p>From what I've seen, Siri sends compressed audio to the cloud which translates that to text. What happens to the text and how does that translate to action? Where is this being handled? Is there any proof that this is done in the cloud?
cjoh超过 13 年前
It'd be interesting to see whether or not Apple changed the Siri protocol since the acquisition. Was this originally how Siri worked when it was independent?<p>Because Siri has roots in government contracting (it's named after SRI International, and was originally funded by DARPA) I wonder if the roots of the obfuscation start there rather than at Apple.
评论 #3236053 未加载
评论 #3236277 未加载
MatthewPhillips超过 13 年前
Cannot upvote this enough. Stuff like this is the reason I read HN.
jakubw超过 13 年前
I wonder if there are any characteristics about the microphone in Apple devices that the servers could check the audio against to prevent this sort of a thing. There should be a way to somewhat distinguish the device used to record a stream given Apple's control over the devices on which Siri runs and overcoming that would be hard enough for anyone to bother.
评论 #3235830 未加载
pdenya超过 13 年前
Really interesting. I'm curious what their tools look like but the github repository the article links to is currently empty.
评论 #3235658 未加载
victoknight超过 13 年前
&#60;spolier&#62; guess who doesn't verify the root CA. Think of all the fun to be had with a Siri man-in-the-middle
评论 #3235753 未加载
评论 #3237368 未加载
评论 #3235681 未加载
mbq超过 13 年前
Anyway, this is a proof that siri is a pure cloud service and as such may work even on 5-yo Sagem...
评论 #3236127 未加载
achompas超过 13 年前
I would LOVE to backward-engineer Siri's speech-analysis algorithms. Confidence scores help, but it doesn't look like any other modeling data is available?
评论 #3242631 未加载
mirkules超过 13 年前
Is there a possibility to craft a Siri server reply with malicious code? Shouldn't be too hard for the applidium guys to attempt (maybe even use a fuzzer?)
评论 #3235660 未加载
tucson超过 13 年前
"Seems like someone at Apple missed something!"<p>What did Apple miss? (in other words: how could they avoid this, assuming they wanted to avoid such crack)
jasonkolb超过 13 年前
I love reading investigative coding stories. Always fun to take a peek into secret--especially high-profile--code.<p>Thanks!
aritraghosh007超过 13 年前
The remote server is located at apple-compu.car1.charlotte1.level3.net.
signa11超过 13 年前
can the server-side be a watson like computer cluster ? just curious...
_hnwo超过 13 年前
down for me :(
评论 #3235715 未加载
hc5超过 13 年前
&#62; The iPhone 4S sends identifiers everywhere.<p>So if I'm reading this right, Apple is sending UDIDs over HTTP?
评论 #3236099 未加载
评论 #3236697 未加载
评论 #3236093 未加载
Volpe超过 13 年前
No one is at all concerned that this is a hack?<p>I know it's interesting stuff, but I'm curious what "rights" Applidium have in publishing this information.<p>With this information, (if I'm not wrong) it wouldn't take long to simply DDoS Siri...<p>Or port Siri to Android (effectively stealing IP).<p>(I have no bias either way, just pointing out, if someone figured out how to reverse engineer dropbox, so you could use their space, without a dropbox account, would we all be going "wow, this is so cool!" or would we be crying out "this is such an irresponsible hack!")
评论 #3236361 未加载
评论 #3236565 未加载
评论 #3240074 未加载
评论 #3236473 未加载
评论 #3236493 未加载