Siri’s Security Protocol Cracked; Could Be Used With Other Apps And Devices But…

Siri Icon

Ever since Apple has introduced SiriiPhone 4S’ revolutionary voice activated personal assistant feature, hackers have been in love with it.

They’ve ported Siri to non-iPhone 4S devices and hacked it to add custom commands. Folks at Applidium have now announced that they’ve hacked Siri’s security protocol.

Applidium had released the open source video player VLC app in the App Store, which was later removed due to licensing issues.

Applidium announced the news on their blog:

Today, we managed to crack open Siri’s protocol. As a result, we are able to use Siri’s recognition engine from any device. Yes, that means anyone could now write an Android app that uses the real Siri! Or use Siri on an iPad! And we’re going to share this know-how with you.

They’ve managed to do this by reverse engineering the protocol used by Siri to communicate with Apple’s servers. To prove that it works, they have created a demo in which they send a command to Apple servers without using an iPhone and get a response from Siri (you need Flash to play the clip below):

Unfortunately, it seems highly unlikely that hackers will be able to bring Siri to non-iPhone 4S devices or other smartphone platforms like Android as it needs a unique identifier from an iPhone 4S for the protocol to work. Apple could also easily block or blacklist the unique identifier if it sees commands being sent to its servers from multiple IP addresses.

Hackers also reveal that Apple’s servers respond back with a lot of information such as confidence score and timestamp for each word.

It will be interesting to see how much time it takes Apple to clamp down on such unauthorized use of Siri.

Source: Applidium

Via: The Next Web