Light Commands exploit

Hi All,

Just wondering whether this possible exploit had hit the radar at Mycroft yet -



Hadn’t seen this, thanks for posting it :slight_smile:

Here’s another general link for anyone else interested.

We have talked about various authentication mechanisms that would mitigate this type of attack to a degree. Speaker identification would certainly make it harder in that the attackers need to craft the data transmitted to imitate a specific individual. Or pairing a hardware device that you keep with you like your phone could also be used to restrict voice commands to when that device is in range.

1 Like

Wow. That is one interesting read.