Feeds

Coders crack iPhone 4S Siri

Protocol probed

3 Big data security analytics techniques

French software developer Applidium claims to have reverse engineered the protocol by which the iPhone 4S' Siri voice assistant talks to Apple's voice recognition and analysis servers.

But don't expect a flood of superior Siri clones on other platforms, or even on other iPhones. Each communication is tied to the sending 4S' unique ID.

With a bit of digital certificate jiggery-pokery, a fake DNS server and the use of Zip decoding, the Applidium team was able to start analysing the binary data.

The upshot: Siri takes the voice recording, encodes it in the Ogg Speex format, Zips it, encrypts it and sends it to the server guzzoni.apple.com for decoding and analysis.

Says the Applidium team: "The protocol is actually very, very chatty. Your iPhone sends a ton of things to Apple’s servers. And those servers reply an incredible amount of informations. For example, when you’re using text-to-speech, Apple’s server even reply a confidence score and the timestamp of each word."

Applidium has even posted a sample: the speech it sent to Apple's Siri servers - not from an iPhone 4S, though - and the XML data returned by the speech-to-text operation.

Applidium has uploaded the tools it created and used to crack Siri, but - understandably - it's not providing the iPhone 4S ID it used. We'd expect Apple to be able to spot near-simultaneous Siri requests from the same device in many, many different locations and block the device ID.

If it hasn't implemented such a trick it certainly will soon. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.