top of page
  • Writer's pictureThe DigitalBank Vault

Hacking an iPhone : What is Apple's Siri flaw?

The flaw involves someone manipulating voice controls for purposes that can be construed as unlawful. For example, someone could tell Siri to send a message or make a phone call from a device that isn't theirs. They can tell Siri to call the last number that was dialed on the device.

Anyone nearby can say "Hey Siri, text mom" and it will begin composing a message. They could also make phone calls by saying something like, "Hey Siri, call Bob" and it will find someone in their contacts with that name associated to dial.

There is however a catch in that the person must have a voice print that's similar to the device's owner in order for the command to be executed successfully.

Other voice assistants are on the market as well that support varied users such as Google Assistant and Amazon’s Alexa. Both devices can learn to discern one person’s voice from another.

So what does this mean? Well if your voice is comparable to someone else’s, you could, in theory, access their device without even touching it.

Turn off Siri and protect your privacy

If you're even slightly concerned with others hijacking your device, you can turn off the “Hey Siri” feature. Here's how:

Go to Settings

Scroll down and tap on “Siri & Search”

You can turn off the toggle that says “Listen for ‘Hey Siri”

Or you can turn off the toggle that says “Allow Siri When Locked” - This will leve Hey Siri on, but only when your iPhone is unlocked.

For users that want their messages to stay private, these extra precautions may help give you that peace of mind. Also, be mindful that many devices such as iPhone 6S through iPhone X, Apple TV, iPod Touch 5th generation, some iPad Pro and iPad Mini versions, some Apple Watch versions, and HomePod all have Siri installed on them.

DigitalBank Vault , is a Bank Vault for Digital Communication : an ultra secure communication device that protects sensitive and confidential information with top-grade end-to-end encryption on an impenetrable platforms that includes email , voice and text messages , secure voice calls ,and secure file storage

20 views0 comments


bottom of page