{"id":18213,"date":"2018-06-06T14:00:53","date_gmt":"2018-06-06T18:00:53","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18213"},"modified":"2022-04-27T15:16:14","modified_gmt":"2022-04-27T19:16:14","slug":"alexa-or-google-home-could-be-spying-on-you","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/alexa-or-google-home-could-be-spying-on-you\/","title":{"rendered":"Alexa or Google Home Could Be Spying on You"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Alexa and Google Home are among the most innovative artificial intelligence applications in recent years, but they could be spying on you. Smart-home voice assistants can actually record the information you give them, regardless of whether you\u2019re asking for the weather or requesting a special song as you sit down to dinner.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/vulnerability-found-alexa-app\/\"><b>Vulnerability Found in Alexa App, What Should You Do?<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">There are lots of positives to using these devices, but they may know more about you than you\u2019d like. Here\u2019s a breakdown of why Alexa and Google Home could be a detriment and not a help.<\/span><\/p>\n<p><b>How It Works<br \/>\n<\/b><span style=\"font-weight: 400;\">These devices may not be listening to everything you say, but once you request an interaction with \u201cAlexa\u201d or \u201cOK Google,\u201d <\/span><a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-5182577\/How-Google-Amazon-SPYING-you.html\"><span style=\"font-weight: 400;\">they will record you<\/span><\/a><span style=\"font-weight: 400;\">. As soon as these devices hear these keywords, they will instantly upload everything uttered to cloud servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reason for this action is Alexa and Google Home need to store information in the cloud in order to respond back to you. The data is processed into machine-comprehensible instructions and the devices return with an answer to your command. For example, if you ask Alexa to read you an email or an SMS, this information could be stored on cloud servers forever.<\/span><\/p>\n<p><b>What Else Should I Know?<br \/>\n<\/b><span style=\"font-weight: 400;\">An estimated 31 million Alexa devices have been sold already, as well as 14 million Google Home devices, which is a dream for marketers. Your data could be compiled and used for marketing purposes and all your data will be concentrated in a central place. Having all your data exposed in one area could make it easy for hackers and cybercriminals to target you.<\/span><\/p>\n<p><b>What Can I Do?<br \/>\n<\/b><span style=\"font-weight: 400;\">You are able to delete the <\/span><a href=\"http:\/\/www.businessinsider.com\/how-to-delete-recorded-audio-history-google-home-and-amazon-echo-alexa-2017-7\"><span style=\"font-weight: 400;\">information that Alexa and Google Home<\/span><\/a><span style=\"font-weight: 400;\"> collects about you by going to your Amazon or Google account and deleting old recordings. But, if you do this, the devices will unlearn some of the information they know about like your email account to read messages out loud or your musical preferences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be careful which devices you link to Alexa or Google Home. Remember that sensitive, personal information may belong to the device as much as it belongs to you. Another option is you can choose when to turn off a smart home device\u2019s connection to your information. For example, if you\u2019re not using an online shopping feature on your device, turn it off.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The AI assistants you think are helping you could be monitoring your every move. <\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[6],"tags":[252,195,106,218,545,249,243,223],"class_list":["post-18213","post","type-post","status-publish","format-standard","hentry","category-privacy","tag-app1","tag-app5","tag-google","tag-privacy","tag-safety","tag-security","tag-technology","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18213"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18213\/revisions"}],"predecessor-version":[{"id":18913,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18213\/revisions\/18913"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}