I think the technical grounds for skepticism are stronger than the legal ones. There are millions of smartphones in use. Monitoring network traffic is not all that hard; many thousands of nerds are doing it. A regular outgoing audio stream would be really, really hard to hide.https://twitter.com/OrinKerr/status/1115706100920221697 …
-
Show this thread
-
You can get away with doing it on a handful of targeted devices (NSA does!) but if it were the DEFAULT behavior of any model, some geek running Wireshark would notice & make front page headlines almost immediately. Maybe YOU don’t know how look, but waaaay too many folks do.
3 replies 1 retweet 25 likesShow this thread -
Replying to @normative
I'm doubtful it's happening too. But I'm not sure I buy the traffic analysis logic: First, it'd be easy enough to hide the traffic behind legitimate traffic. It'd not be that hard to bulk upload pending traffic when video calling or such.
1 reply 0 retweets 0 likes -
Replying to @AndresFreundPol @normative
Second, no need to actually transfer audio. It wouldn't actually need to be high fidelity voice recognition needing online access. Phones are more than powerful enough to accurately parse words for add targeting. And not just recently.
1 reply 0 retweets 0 likes
And we know that there's plenty regular-ish outgoing requests on phones.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.