Skip Navigation

You're viewing part of a thread.

Show Context
193 comments
  • Again: Which you could easily see by looking at the amount of traffic sent after unmuting, unless you believe that Amazon secretly found an infinite compression algorithm they use only in muted Echo devices.

    You understand that sending more information means more traffic? Unless - as I stated - they found a perfect compression algorithm, you'd be able to tell.

    • I’m a little confused as to why you are being so condescending. Every time you say “this is so simple if you do X”. And then I say “what about Y?” And then you’re like “that’s obvious too, just do Z” and kind of insulting me, even though you did not account for it in your prior comment. And it becomes less trivial with each additional test.

      Your first method involves simply checking if there is any traffic after muting. Your revised method involves additionally checking if there is any traffic for some period of time after muting (how long?). And now your third method involves doing the first two things as well as gathering data on the average amount of traffic in your requests generally and deciding whether subsequent traffic during requests after muting for an unspecified amount of time is significantly large enough to conclude it is sending information acquired during muting.

      But if they send it a little bit at a time, or they just leak a small portion of it occasionally in some requests, I think it would be very challenging to conclude definitively one way or the other.

      I’m actually aware that there is no infinite compression algorithm, so you don’t need to keep saying that. And to be honest it just makes you look like you are lacking imagination because it’s not the only way to make detection difficult as illustrated by my responses.

      • I’m a little confused as to why you are being so condescending. Every time you say “this is so simple if you do X”. And then I say “what about Y?” And then you’re like “that’s obvious too, just do Z” and kind of insulting me, even though you did not account for it in your prior comment. And it becomes less trivial with each additional test.

        I'm writing the way I do because you're bringing up points that are incredibly easy to disprove as if they're some kind of gotcha. "They might store the data" seems like a good point until you remember that even that stored data has to be transmitted at some point. How would you have me reply to these non-arguments?

        Your first method involves simply checking if there is any traffic after muting.

        Because it's sufficient to prove that the device doesn't just not respond. That was the initial point I was replying to. Why do I have to find any possible counter-arguments when they weren't brought up?

        Your revised method involves additionally checking if there is any traffic for some period of time after muting (how long?).

        Yes, because it's sufficient to disprove the additional point you brought up. Just do it until the heat death of the universe if you want to be sure. You're the one theorizing they might store the data locally. Create a full hypothesis, and I can tell you how to disprove it.

        And now your third method involves doing the first two things as well as gathering data on the average amount of traffic in your requests generally and deciding whether subsequent traffic during requests after muting for an unspecified amount of time is significantly large enough to conclude it is sending information acquired during muting.

        You make it sound like "gathering data on the average amount of traffic in your requests generally" is complicated, and like you don't already have the data from the previous two points.

        But if they send it a little bit at a time, or they just leak a small portion of it occasionally in some requests, I think it would be very challenging to conclude definitively one way or the other.

        And you could still see this through statistical analysis.

        I’m actually aware that there is no infinite compression algorithm, so you don’t need to keep saying that. And to be honest it just makes you look like you are lacking imagination because it’s not the only way to make detection difficult as illustrated by my responses.

        It's the only way your points make full sense. It's a simple truth of the universe that transmitting more information requires transmitting more information. The only way to get around this is the aforementioned infinite compression algorithm. Any other method is detectable through statistical means.

You've viewed 193 comments.