<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>The Science of Inaudible Voice Hacking</title>
        <link>https://stream.echo6.co/videos/watch/26ad2e36-4bae-43b0-8c82-948a1ccae478</link>
        <description>Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine. Support me through Patreon: https://www.patreon.com/thehatedone or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F, Sources Your Phone Is Listening - Ultrasonic Cross-Device Tracking https://www.youtube.com/watch?v=j1FfVK6sj4I Hidden Audio Commands https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html Burger King TV Ad Trolling Google Home https://www.nytimes.com/2017/04/12/business/burger-king-tv-ad-google-home.html? Ultrasonic Voice Commands https://www.bbc.com/news/technology-41188557 https://www.scientificamerican.com/article/ultrasonic-attack-device-hacks-phones-through-solid-objects/ Voice Obfuscation &amp; Psychoacoustics https://www.usenix.org/conference/woot15/workshop-program/presentation/vaidya Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition https://www.usenix.org/system/files/conference/woot15/woot15-paper-vaidya.pdf Psychoacoustics https://adversarial-attacks.net/ Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding https://www.ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding/ Alexa Can Be Hacked By Chirping Birds https://www.fastcompany.com/90240975/alexa-can-be-hacked-by-chirping-birds Alexa Skills Hacking https://www.wired.com/story/amazon-echo-alexa-skill-spying/ https://news.ncsu.edu/2021/03/alexa-skill-vulnerabilities/ Voice Squatting https://www.forbes.com/sites/thomasbrewster/2018/05/16/amazon-echo-google-home-voice-squatting-attack-exposes-devices/ DolphinAttack Animal Frequency Hearing Range https://en.wikipedia.org/wiki/File:Animal_hearing_frequency_range.svg https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa Research Papers DolphinAttack: Inaudible Voice Commands https://dl.acm.org/doi/10.1145/3133956.3134052 Inaudible Voice Commands: The Long-Range Attack and Defense https://www.usenix.org/conference/nsdi18/presentation/roy Inaudible Voice Commands https://arxiv.org/pdf/1708.07238.pdf SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves https://surfingattack.github.io/papers/NDSS-surfingattack.pdf https://surfingattack.github.io/ SurfingAttack https://nakedsecurity.sophos.com/2020/03/02/siri-and-google-assistant-hacked-in-new-ultrasonic-attack/ Ultrasonic Cross-Device Tracking https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ Ultrasonic Beacons https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/ https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 Ultrasonic Cross-Device Transmission https://www.sciencedirect.com/science/article/pii/S2214212619304697 Light Commands (Laser Hacking)' https://www.nytimes.com/2019/11/04/technology/digital-assistant-laser-hack.html https://lightcommands.com/ Credits Musci By: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:47:29 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>The Science of Inaudible Voice Hacking</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/26ad2e36-4bae-43b0-8c82-948a1ccae478</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=26ad2e36-4bae-43b0-8c82-948a1ccae478" rel="self" type="application/rss+xml"/>
    </channel>
</rss>