At least hypothetically, this would seem to qualify as cracking (i.e., remote intrusion into a computer without permission).
More practically, though, it will keep savvy users (such as yours truly) from ever enabling any significant voice-activated control of anything important.
More practically, though, it will keep savvy users (such as yours truly) from ever enabling any significant voice-activated control of anything important.