
CLASSIC: The Strange Story of the GhostNet
Stuff They Don't Want You To Know
00:00
The GhostNet Breach and Privacy Concerns on Voice-Activated Devices
This chapter discusses the GhostNet breach in the Tibetan computer system, revealing the hacking of computers and the turning of them into listening devices. It also explores the limitations and privacy concerns surrounding voice-activated devices like Google Home, Alexa, and Siri. Additionally, it mentions the difficulty in tracking cyber attack origins and the implications on power grids.
Transcript
Play full episode