Skip to main content

Developers crack Siri’s security protocol to enable it with any device, though there’s a catch

The developers over at Applidium are claiming they have cracked Siri’s security protocol, which could enable the speech recognition technology on any device. The possibilities of devices range from iPhone 4, to iPad, to Mac, to even Android.

Last month we showed you Siri running on an iPhone 4 (seen above), but today the possibilities look beyond that. With the crack, developers could even work to implement Siri inside of their own apps. Of course, Apple could push a fix for this sparking another cat and mouse game.

When it comes to this crack you actually need a UDID of an iPhone 4S to get this working. At any time Apple could block the UDID if they see something suspicious.

Applidium has released a set of tools for developers to begin cracking, and says it will be fairly easy to obtain a UDID with them. Check out their post for all of the details.

They also found that Apple uses a ton of information when communicating with its own servers when it comes to Siri.

The iPhone 4S really sends raw audio data. It’s compressed using the Speex audio codec, which makes sense as it’s a codec specifically tailored for VoIP.

The iPhone 4S sends identifiers everywhere. So if you want to use Siri on another device, you still need the identfier of at least one iPhone 4S. Of course we’re not publishing ours, but it’s very easy to retrieve one using the tools we’ve written. Of course Apple could blacklist an identifier, but as long as you’re keeping it for personal use, that should be allright!

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel