Refine by MP, party, committee, province, or result type.

Results 31-45 of 51
Sorted by relevance | Sort by date: newest first / oldest first

Information & Ethics committee  Apple's systems are under constant attack. I don't know precisely if Siri itself has been a subject of attack or not, but I think a good default position would be to assume it has. However, because the Siri data is not associated with the overall Apple account, while we consider

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  I'm not aware of any, no.

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  I guess the second part is a form of use by the company. Yes, we use it for Siri, and for Siri purposes alone.

May 29th, 2019Committee meeting

Erik Neuenschwander

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  The only metadata profile that we have is one that is used to tailor your actual interactions with Siri. For example, we are training our voice models to do natural language recognition on the sound profile. This is really just within the Siri business or the Siri experience. If

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  I'll split that into two parts, I guess. One, when the application gains the foreground and is able to execute, they can reload the content, if they see fit to reload the content. At that point, you've transferred control to that application, and it will be able to execute and

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  In terms of the information on our devices that support Siri, there is a part of the device that is constantly listening. On some of our devices we've isolated it beyond even iOS, beyond our operating system, into a dedicated coprocessor, basically a specialized piece of hardware

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  It's not collecting it all. There's what we call a “ring buffer”. There's basically a short period that is transiently recorded to analyze for that wake-up word, and then it's continually overwritten as time progresses. There isn't any collection for more than just the ephemeral

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  That's correct. Yes.

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  Again, it's not even retained by the device. As it's transiently listening, it's being continually overwritten. When the user uses a wake-up word, there is some machine learning that happens on the device as it adapts the audio model to the speaker to reduce the number of false p

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  The scope of the data is the utterance until it reaches a termination point and Siri thinks the user has stopped talking, along with information like the device model to tailor the response back to the device and a random device-generated identifier, which is the key to the data

May 29th, 2019Committee meeting

Erik Neuenschwander

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  Yes, it's the fingerprinting issue.

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  First, I'll step back, I think, to explain a bit of the context. When we're talking about, say, tracking, there can be some technologies that are explicitly for tracking, such as cookies. One of the evolutions we've seen is the development of what we call a synthetic fingerprint.

May 29th, 2019Committee meeting

Erik Neuenschwander

Information & Ethics committee  At this time, I don't remember exactly how long that exposure was.

May 29th, 2019Committee meeting

Erik Neuenschwander