{"id":292,"date":"2025-09-17T15:37:56","date_gmt":"2025-09-17T12:37:56","guid":{"rendered":"https:\/\/sites.uwasa.fi\/bugged\/?p=292"},"modified":"2025-09-18T09:34:03","modified_gmt":"2025-09-18T06:34:03","slug":"ever-listening-artificial-ears-at-the-mercy-of-others-in-public-spaces","status":"publish","type":"post","link":"https:\/\/sites.uwasa.fi\/bugged\/2025\/09\/17\/ever-listening-artificial-ears-at-the-mercy-of-others-in-public-spaces\/","title":{"rendered":"Ever-Listening Artificial Ears \u2013 At the Mercy of Others in Public Spaces"},"content":{"rendered":"<p><strong>Blog by Satu Rantakokko<\/strong><\/p>\n<p>It\u2019s been years since the public first reacted to revelations that smartphones may be listening to users\u2014allegedly to enable targeted advertising. This often manifested as ads appearing on social media shortly after discussing a particular topic. Today, most people have experienced some form of technological eavesdropping. Targeted ads typically appear within hours or a day of the conversation. (For more on the experience and emotional impact of technological eavesdropping, see Segijn et al., 2024)<\/p>\n<p>For me, one pivotal moment occurred years ago in a shopping mall. I walked past a store and casually told my companion, \u201cLet\u2019s turn after store X.\u201d I had no interest in that store, which made it easy to link the sudden appearance of related ads on social media to that offhand comment. My phone was in my backpack, behind me.<\/p>\n<p>At the time, I wondered how my voice could have been picked up so clearly in a noisy mall\u2014especially since I wasn\u2019t even facing the phone. Years later, that moment resurfaced in my mind after another experience.<\/p>\n<p>I was catching up with a friend who belongs to a small, privacy-conscious minority. He doesn\u2019t use smartphones and shares no personal information on his limited social media accounts. As a result, social media platforms struggle to target ads to him.<\/p>\n<p>Except once. He described a situation where he began receiving targeted ads related to topics he had discussed during a car ride\u2014with a friend who owns a smartphone.<\/p>\n<p>So, the familiar eavesdropping-to-advertising scenario played out again\u2014but this time, the ads were directed at a bystander, not the phone\u2019s owner. Can someone else\u2019s smart device really recognize you or me by voice? Is that even possible?<\/p>\n<p>Technically, yes\u2014it\u2019s entirely possible.<\/p>\n<p>Smartphones are designed to recognize their owners regardless of context. This is essential, as voice-activated devices must be able to distinguish between authorized users and others. Given the vast amount of sensitive personal and professional data stored on smartphones, the risk of data breaches is high if the device falls into the wrong hands. That\u2019s why user authentication methods are actively developed\u2014including voice profiling, which can be created from even a short speech sample.<\/p>\n<p>Voice is considered a behavioral biometric identifier. It can reveal a speaker\u2019s ethnicity, age, gender, and emotional state. Each person has a unique vocal signature shaped by rhythm, pauses, pitch, volume, word choice, sighs, and more. Voice-based identification is a growing field of research, increasingly powered by AI and deep learning technologies. (See Hanifa, Isa &amp; Mohamad, 2021; Ohi et al., 2021.)<\/p>\n<p>Back in that shopping mall years ago, I don\u2019t recall receiving a flood of unrelated ads afterward. But I might not have noticed, as I was less vigilant about phone privacy back then. I can\u2019t say for sure whether someone else\u2019s comment nearby might have triggered advertising.<\/p>\n<p>What\u2019s clear is that for a phone to distinguish its owner\u2019s voice profile, it must listen broadly when others are present. It must analyze surrounding voices to determine whether the speaker is the owner or not. (See Ohi et al., 2021.)<\/p>\n<p>And what about my friend\u2019s case, where it seems an app on someone else\u2019s phone recognized him and began serving targeted ads based on spoken topics? After he told his friend, the friend revoked microphone permissions for all apps and began disabling the mic at the software level when not in use. The data leak stopped, and no further targeted ads appeared. It was never determined which app\u2014or apps\u2014were responsible for identifying the bystander and triggering the ads.<\/p>\n<p>Even though it wasn\u2019t me, the idea of being technologically eavesdropped on as a bystander felt disturbing\u2014almost repulsive. If automated listening of bystanders is this advanced, it raises unsettling questions: What else is being heard and profiled about me, even when I protect my own phone, block listening, and disable location tracking? Is my voice and location still casually logged through other people\u2019s devices? Where does this data go, and what is known about me? Who has access to it, and how is it used?<\/p>\n<p>Such data leakage is hard to detect, especially since most of us carry smart devices constantly. That\u2019s why we rarely consider how vulnerable we are as bystanders\u2014and when targeted ads appear, we don\u2019t always realize that the triggering conversation may have been captured by someone else\u2019s device, not our own.<\/p>\n<p>The old idea that \u201cI have nothing to hide\u201d is due for an update. Does that same carefree mindset apply to all your friends, family, and even your workplace?<\/p>\n<p><em><strong>Dear reader, have you ever experienced technological eavesdropping as a bystander\u2014or suspected it?<\/strong><\/em> Have your data ever been linked in surprising ways\u2014like a conversation near your work phone leading to ads on your personal profile, or vice versa?<\/p>\n<p><em>Or have you noticed\u2014or suspected\u2014something even more advanced? If so, don&#8217;t hesitate to reach out to us @ satu.rantakokko[at]uwasa.fi\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>References<\/strong><\/p>\n<p>Hanifa, R. M., Isa, K. &amp; Mohamad, S. (2021). A review on speaker recognition: Technology and challenges. Computers &amp; Electrical Engineerin, vol. 90. <a href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107005\">https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107005<\/a><\/p>\n<p>Ohi, A. Q., Mridha, M. F., Hamid, M. A. &amp; Monowar, M. M. (2021). Deep speaker recognition: Process, progress, and challenges. IEEE Access, 9, 89619-89643. <a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2021.3090109\">https:\/\/doi.org\/10.1109\/ACCESS.2021.3090109<\/a><\/p>\n<p>Segijn, C. M., Strycharz, J., Turner, A. &amp; Opree, S.\u00a0 J. (2024). Conversation-Related Advertising and Electronic Eavesdropping: Mapping Perceptions of Phones Listening for\u00a0Advertising in the United States, the Netherlands, and Poland. <a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20563051241288448\">https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20563051241288448<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the vast amount of sensitive personal and professional data stored on smartphones, the risk of data breaches is high if the device falls into the wrong hands.<\/p>\n","protected":false},"author":388,"featured_media":286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[38,28,32,4,34,37,35,3,33,36],"class_list":["post-292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-yleinen","tag-advertising","tag-data","tag-eaves-dropping","tag-gdpr","tag-infringement","tag-marketing","tag-personal","tag-privacy","tag-smartphones","tag-violation"],"acf":[],"post_meta":"<span class=\"author\"> <span class=\"vcard\"><a class=\"url fn n\" href=\"https:\/\/sites.uwasa.fi\/bugged\/author\/rrousi\/\">Rebekah Rousi<\/a><\/span><\/span><span class=\"posted-on\"><a href=\"https:\/\/sites.uwasa.fi\/bugged\/2025\/09\/17\/ever-listening-artificial-ears-at-the-mercy-of-others-in-public-spaces\/\" rel=\"bookmark\"><time class=\"entry-date published updated\" datetime=\"2025-09-17T15:37:56+03:00\">17.09.2025<\/time><\/a><\/span>","post_categories":"<span class=\"entry-categories cat-links\"><a href=\"https:\/\/sites.uwasa.fi\/bugged\/category\/yleinen\/\" rel=\"category tag\">Yleinen<\/a><\/span>","post_thumbnail":"<a href=\"https:\/\/sites.uwasa.fi\/bugged\/2025\/09\/17\/ever-listening-artificial-ears-at-the-mercy-of-others-in-public-spaces\/\"><img width=\"640\" height=\"360\" src=\"https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2025\/09\/ai-image-2-blog-1-640x360.png\" class=\"attachment-banner-wide-640 size-banner-wide-640 wp-post-image\" alt=\"Devices with ears generated by AI\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2025\/09\/ai-image-2-blog-1-640x360.png 640w, https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2025\/09\/ai-image-2-blog-1-320x180.png 320w, https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2025\/09\/ai-image-2-blog-1-1024x576.png 1024w, https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2025\/09\/ai-image-2-blog-1-1280x720.png 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a>","_links":{"self":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":4,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/292\/revisions\/296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/media\/286"}],"wp:attachment":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}