After the release of Siri, hacker have been after it and tried to implement it in any possible working device. First it was iPhone 4S who had the facility then came iPhone 4 followed by iPhone 3GS to which Siri was ported to. Now a group of individuals from Applidium have posted a story that explains how the group was able to crack Siri so that they could run the virtual assistant on any device.
Amazing isn’t it? They explain that they were able to analyze those voice inputs even that are never spoken through an iPhone. This is what the technically did:
Basically, the group was able to get Siri to analyze voice inputs that were never spoken through an iPhone. It turns out Siri uses TCP to speak to a server at 22.214.171.124 using port 443. Applidium then logged on to a desktop computer, entered in that IP address, and realized that Apple was returning a server named “guzzoni.apple.com” and that Siri was using HTTPS as its protocol. Putting it simply, the group then created a fake guzzoni.apple.com address and tricked Siri into sending commands there instead of to Apple’s own server. Applidium discovered that Siri sends Apple a time stamp for each word spoken, as well as a reply confidence score, and described the software as “very, very chatty.”
This means that we can have Siri on our Androids as well. Hackers have also brought us a set of tools that anyone can use to create Siri-enabled applications and hackers are encouraging people to test them out and bring out new and interesting stuff. “And let’s see how long it’ll take Apple to change their security scheme,” the group jested.