Siri hack reveals how your humble assistant does her magic

Siri hack reveals how your humble assistant does her magic
Are you curious about the way Siri does her magic? Well, so were the guys at Applidium, which is why they rolled up their sleeves and successfully managed to take a look at some of Siri's inner workings

Through a well-known hacking method called reverse-engineering, they were able to figure out how Apple's humble personal assistant communicates with the company's servers. Unsurprisingly, it turns out that Siri uses a secure connection, and a valid security certificate was needed in order to establish one. However, the guys discovered that any self-signed certificate would do the trick just fine, meaning that they had no trouble obtaining permission to transfer data with Apple's server.

Incoming and outgoing connections were monitored via a proxy server during the procedure, which is why the folks could take a look at the data that is sent to Apple and at the data that is returned to the iPhone 4S. In a nutshell, Siri compresses your audio input and sends it to the server, after which the data gets processed and returned to the sender's device. However, before replying, Apple's server verifies whether the the iPhone in use is valid or not via its unique identifier, also known as UDID. 

Those who are eager to take a look under Siri's hood are free to download the tools that were used during the intervention. Besides, developers might be interested in knowing that thanks to cracking into Siri's communications protocol, coming up with an iOS or even an Android application that takes advantage of the real Siri is quite possible indeed. However, you might want to be quick in cracking Siri open yourself as it is only a matter of time until Apple does something to patch the holes that make it possible.

Related phones

iPhone 4s
  • Display 3.5" 640 x 960 pixels
  • Camera 8 MP / 0.3 MP VGA front
  • Processor Apple A5, Dual-core, 800 MHz
  • Storage 64 GB

FEATURED VIDEO

4 Comments

1. cyborg009

Posts: 119; Member since: Sep 17, 2011

The article reads what already every1 knows !!! phone sends the data n server replies.. what was the news !!

3. JGuinan007

Posts: 699; Member since: May 19, 2011

I didn't know this I thought there was a very tiny lady inside the phone on a tiny computer looking everything up on google and spitting back the answer Thank you PA for opening my eyes

2. ILikeBubbles

Posts: 525; Member since: Jan 17, 2011

this article was probably for people who had heard of siri and maybe that some devs couldn't make it work on android yet as an explination of why. i didn't nessisarily know for sure that apple would check the UDID. it was a logical jump but not really difinitive.. i don't know if phonearena is for people who only care about things that no one knows.. it seems sort of a general news place. which i really enjoy... but if you want to oversimplify, then like your own comment. . . well i'll like it too. :) just to make you feel better.

4. Phullofphil

Posts: 1762; Member since: Feb 10, 2009

it was more about them getting in to the system and actually using the system. they just added thhat part for people that did not know.. it sure does like apple knew sombody would eventually hack it though. i woner what will happen first. a hack into siri for all to use or a equally usfull AI. there are some good ones out thhere righht now thatt are layered over googles sppech recognition. i wonder if they will improve with Ice cream sandwitches better voice recognition. from what i hheard google plans of a siri were scrapped. i personaly think google searchh does almost plenty. for my needs. but i have not used siri. but i do use my google voice recognition alot.

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.