Hacker News new | past | comments | ask | show | jobs | submit login

I'm wondering this too.

Like hey, let's install some under developed AI from some unknown company with unknown security policies on top of a device with access to hordes of personal data and the ability to make transactions online.

No hacker will EVER think to use it as an attack vector /s

I didn't look into Alias deeply, but does it even have network access at all? I don't see a reason it would have to.

It needs it for setup (so you can set up the wake word using your phone), but then after that it can be disconnected.

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact