{"id":28191,"date":"2019-08-02T17:00:23","date_gmt":"2019-08-02T17:00:23","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30359\/Apple-Halts-Practice-Of-Contractors-Listening-In-To-Users-On-Siri.html"},"modified":"2019-08-02T17:00:23","modified_gmt":"2019-08-02T17:00:23","slug":"apple-halts-practice-of-contractors-listening-in-to-users-on-siri","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/","title":{"rendered":"Apple Halts Practice Of Contractors Listening In To Users On Siri"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\" class=\"ff-og-image-inserted\"><\/div>\n<p>Apple has suspended its practice of having human contractors listen to users\u2019 Siri recordings to \u201cgrade\u201d them, following <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings\" data-link-name=\"in body link\" class=\"u-underline\">a Guardian report revealing the practice<\/a>.<\/p>\n<p>The company said it would not restart the programme until it had conducted a thorough review of the practice. It has also committed to adding the ability for users to opt out of the quality assurance scheme altogether in a future software update.<\/p>\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/apple\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">Apple<\/a> said: \u201cWe are committed to delivering a great Siri experience while protecting user privacy. While we conduct a thorough review, we are suspending Siri grading globally. Additionally, as part of a future software update, users will have the ability to choose to participate in grading.\u201d<\/p>\n<p>Contractors working for Apple in Ireland said they were not told about the decision when they arrived for work on Friday morning, but were sent home for the weekend after being told the system they used for the grading \u201cwas not working\u201d globally. Only managers were asked to stay on site, the contractors said, adding that they had not been told what the suspension means for their future employment.<\/p>\n<p>The suspension was prompted by a report in the Guardian last week that revealed the company\u2019s contractors \u201cregularly\u201d hear confidential and private information while carrying out the grading process, including in-progress drug deals, medical details and people having sex.<\/p>\n<aside class=\"element element-rich-link element--thumbnail element-rich-link--not-upgraded\" data-component=\"rich-link\" data-link-name=\"rich-link-1 | 1\">\n<div class=\"rich-link\">\n<div class=\"rich-link__container\">\n<div class=\"rich-link__header\">\n<h2 class=\"rich-link__title\">Hey Siri! Stop recording and sharing my private conversations | Roisin Kiberd<\/h2>\n<\/div><\/div>\n<\/div>\n<\/aside>\n<p>The bulk of that confidential information was recorded through accidental triggers of the Siri digital assistant, a whistleblower told the Guardian. The <a href=\"https:\/\/www.theguardian.com\/technology\/apple-watch\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">Apple Watch<\/a> was particularly susceptible to such accidental triggers, they said. \u201cThe regularity of accidental triggers on the watch is incredibly high \u2026 The watch can record some snippets that will be 30 seconds \u2013 not that long, but you can gather a good idea of what\u2019s going on.<\/p>\n<p>Sometimes, the Apple contractor said, \u201cyou can definitely hear a doctor and patient, talking about the medical history of the patient. Or you\u2019d hear someone, maybe with car engine background noise \u2013 you can\u2019t say definitely, but it\u2019s a drug deal \u2026 you can definitely hear it happening. And you\u2019d hear, like, people engaging in sexual acts that are accidentally recorded on the pod or the watch.\u201d<\/p>\n<p>Although Apple told users that Siri data may be used \u201cto help Siri \u2026 understand you better and recognise what you say\u201d, the company did not explicitly disclose that this entailed human contractors listening to a random selection of Siri recordings, including those triggered accidentally.<\/p>\n<p>\u201cToo often we see that so-called \u2018smart assistants\u2019 are in fact eavesdropping, said Silkie Carlo, the director of the UK campaign group <a href=\"https:\/\/bigbrotherwatch.org.uk\/about\/who-we-are\/\" data-link-name=\"in body link\" class=\"u-underline\">Big Brother Watch<\/a>. \u201cWe also see that they often collect and use people\u2019s personal information in ways that people do not know about and cannot control.\u201d<\/p>\n<p>She added: \u201cApple\u2019s record on privacy is really slipping. The current iOS does not allow users to opt out of face recognition on photos, and this revelation about Siri means our iPhones were listening to us without our knowledge.\u201d<\/p>\n<p>The company is not alone in taking flak for its undisclosed quality assurance programmes. Both Amazon and Google also use contractors to check the quality of their voice assistants, according to <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio\" data-link-name=\"in body link\" class=\"u-underline\">reports in Bloomberg<\/a> and on the <a href=\"https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/\" data-link-name=\"in body link\" class=\"u-underline\">Belgian TV channel VRT<\/a>, and contractors from both companies have expressed discomfort at the nature of overheard recordings.<\/p>\n<p>The revelation of Google\u2019s programme in particular caused concern due to the fact the news report was accompanied by a leak of more than 1,000 audio clips, revealing that at least one in 10 had been captured accidentally.<\/p>\n<p>That prompted the data protection commissioner for Hamburg in Germany to ban Google from carrying out those checks for three months, citing a likely breach of the general data protection regulation (GDPR). The commissioner cited an \u201curgent need to protect the rights and freedoms\u201d of Google Home users in enacting the temporary ban, which would otherwise be the responsibility of the Irish data protection commissioner, the lead controller for Google, as well as Apple, in the EU. Google says it had already ceased the practice on 10 July, when it learned about the leak of audio clips.<\/p>\n<p>Amazon and Apple escaped the ban, Hamburg\u2019s commissioner said, because those companies have their German head offices in Munich and are thus covered by a different commissioner under that country\u2019s privacy laws. But the commissioner called on other regulators to \u201cquickly check for other providers of language assistance systems, such as Apple or Amazon, to implement appropriate measures\u201d.<\/p>\n<p>Amazon is the only major provider of voice assistant technology still using humans to check recordings in the EU.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30359\/Apple-Halts-Practice-Of-Contractors-Listening-In-To-Users-On-Siri.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[7327],"class_list":["post-28191","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineprivacyapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-02T17:00:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple Halts Practice Of Contractors Listening In To Users On Siri\",\"datePublished\":\"2019-08-02T17:00:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/\"},\"wordCount\":785,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/99a27a23a250d1d7550f37e672db0b85db753770\\\/0_8_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\",\"keywords\":[\"headline,privacy,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/\",\"name\":\"Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/99a27a23a250d1d7550f37e672db0b85db753770\\\/0_8_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\",\"datePublished\":\"2019-08-02T17:00:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/99a27a23a250d1d7550f37e672db0b85db753770\\\/0_8_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/99a27a23a250d1d7550f37e672db0b85db753770\\\/0_8_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Halts Practice Of Contractors Listening In To Users On Siri\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/","og_locale":"en_US","og_type":"article","og_title":"Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-02T17:00:23+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple Halts Practice Of Contractors Listening In To Users On Siri","datePublished":"2019-08-02T17:00:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/"},"wordCount":785,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac","keywords":["headline,privacy,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/","url":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/","name":"Apple Halts Practice Of Contractors Listening In To Users On Siri 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac","datePublished":"2019-08-02T17:00:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/99a27a23a250d1d7550f37e672db0b85db753770\/0_8_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e81b5411afbd9394cc2ecc694e65aeac"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-halts-practice-of-contractors-listening-in-to-users-on-siri\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyapple\/"},{"@type":"ListItem","position":3,"name":"Apple Halts Practice Of Contractors Listening In To Users On Siri"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28191"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28191\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}