Using that knowledge, hacker who goes by the Twitter handle plamoni has created a proxy server for Siri – Apple’s revolutionary voice activated personal assistant feature called Siri Proxy. He says that the idea behind the proxy server is to make it easy for developers to add functionality to Siri.
He has released the source code of the proxy server along with the instructions on how to set it up on social coding site – GitHub.
He has also demonstrated how the proxy server works by creating a plugin to control a Wi-Fi thermostat, which responds to command such as “What’s the status of the thermostat?”, or “Set the thermostat to 68 degrees”, or even “What’s the inside temperature?”
You can checkout the impressive video demonstration of using Siri to control the thermostat using the proxy server:
The ability to add functionality to Siri on your own does seem very cool. It will be interesting to see what other fun things we get to see using the Siri proxy.
Pete (Twitter handle plamoni) who has developed the Siri Proxy server has clarified in the comments section that this hack doesn’t need a jailbroken iPhone:
I’m the creator of this particular hack, and I can assure you, it doesn’t require the iPhone to be jailbroken. My iPhone 4S is not jailbroken. The only action I needed to take on my iPhone was to install my fake Root CA. Which you can do without jailbreaking. Everything else is done outside of the phone, so it requires no jailbreaking or code to be placed on the phone itself.
In the FAQ section of the SiriProxy project page on GitHub, he has also answered the question about whether this hack will let you run Siri on my iPhone 4, iPod Touch, iPhone 3G, Microwave, etc.
Short answer: No.
Longer answer: While this doesn’t let you do such a thing, it could HELP with such a thing. For instance, if you get Siri installed on your iPhone 4 (don’t ask me how to do this, I really don’t know), and you get someone to give you a valid iPhone 4S UDID (don’t ask me for mine, I will ignore your request), you could use this proxy in order to substitute the valid UDID for your device’s invalid UDID. It would be pretty trivial. Of course, that would allow anyone with access to the proxy use your UDID, so I’d recommend against that sort of action on anything externally accessible without performing some sort of authentication (might I suggest, checking the phone’s UDID? hehe).
You can checkout Siri Proxy’s GitHub page for more details.
Let us know what you think in the comments below.