Are our devices listening to us? Can we protect ourselves? Myth or reality

We're not paranoid… or are we?
We've all experienced it: we talk about a product with someone and, suddenly, adverts for that product flood our social media feeds. It's hard not to wonder, “Is my phone listening to me?” But is it really possible that our devices are constantly spying on us, or is there a simpler, less alarming explanation?

What does technology say?

To begin with, there is no solid evidence to suggest that our devices are constantly listening to us. Doing so would be technically unfeasible and inefficient. If they were actually recording conversations around the clock, it would consume an enormous amount of resources.

The technical reasons:

  1. Impact on the battery: Constant recording would drain the mobile phone's battery much more quickly.

  2. Device performance: Processing conversations in real time would slow the system down and make the user experience noticeably worse.

  3. Memory space: Where would so much information be stored? The device's memory would collapse, and that would be very easy for any user to detect.

  4. Mobile data usage: If recordings were sent over the internet, it would consume a large amount of data from our tariff. Users would notice it quickly.

  5. Dubious efficacy: Analysing hours and hours of conversations to identify a few keywords would be absurd. Companies already have access to this data through other, easier and more direct sources: emails, internet searches, likes, the time you spend looking at a photo, the content you share or even the time you hover your cursor over a link.

How can they be so right without listening to us?

What really happens is that data algorithms are extremely powerful. Every digital action we take generates a data trail that allows companies to build a highly detailed profile of us. Artificial intelligence tools analyse this trail and predict with astonishing accuracy what we might need or want.

For example, a search for “children's bicycles” can trigger a chain of recommendations: children's helmets, training games or liability insurance. If you then talk to someone about the topic, the coincidence is purely accidental.

The reality: data is the business

Although the devices may not be listening to us, that doesn't mean we aren't exposed. The data we share, whether voluntarily or without realising it, is extremely valuable to companies. They use it to personalise adverts, improve their services or, in some cases, sell it to third parties.

Historical evolution: from voice assistants to today's intelligent systems

The first voice assistants, such as Siri or Google Assistant, used basic commands to carry out simple actions. Today, virtual assistants and chatbots with machine learning capabilities can analyse complex behavioural patterns. This amplifies both the potential and the risks of data collection.

Geolocation and constant tracking

Modern devices track our movements through geolocation, even when we're not using specific apps. This tracking creates detailed profiles of our mobility and habits. For example, they can predict our daily routines, such as our workplace or visits to certain establishments.

Access to sensitive data

Virtual assistants not only process voice commands but can also access information stored on our devices, such as messages, contacts and calendar events. This interconnection raises questions about how this data is protected and whether it could be vulnerable to external attacks.

 

Algorithmic biases

Artificial intelligence algorithms can perpetuate existing biases, such as gender stereotypes or racial discrimination, if they are based on historically biased data. This can have significant implications for how we perceive the digital world.

Privacy in childhood

Children, often exposed to online content, are a particularly vulnerable group when it comes to data collection. Companies use strategies designed to capture their attention and gather information about their interests. Both children and parents need to be educated to protect their privacy.

Biometrics and the associated challenges

Biometric identification (fingerprints, facial recognition) makes it easier to access our devices, but it also poses new challenges. What happens when this information falls into the wrong hands? The risk of identity theft is much greater when it involves physical attributes that cannot be changed.

Measures and tools to protect privacy

  1. Set your privacy preferences: Review the options on your devices to limit access to geolocation, microphone and camera.

  2. Use ad-blocking tools: Browse the internet more safely by avoiding the impact of algorithms.

  3. Check the apps you've downloaded: Don't forget to check which permissions are requested and whether they are really necessary for their function.

  4. Avoid public Wi-Fi: If you have to use it, use a VPN to secure your connection.

  5. Educate on privacy: If you have children around you, teach them about the risks and benefits of the digital world.

Conclusion

Our devices don't listen to us constantly, but that doesn't mean we aren't exposed. The algorithms and the data we generate have enormous power, and it is our responsibility to learn how to protect our privacy in an increasingly intrusive digital environment. Awareness and education are the best weapons to keep us safe.

Facebook
Twitter
LinkedIn