@freemin7 heh, you must be fun at parties. What the Piper chose not to waste any more of the 100-word budget on is that devices with microphones sometimes listen for modulated ultrasonic configuration commands, and there have been documented cases of IoT devices passing received input to shell commands. You can literally root some devices by overflowing the wifi password.
@Unixbigot
> heh, you must be fun at parties.
I am told i am. Thanks.
I couldn't find any such cases. A shell shouldn't overflow. However bad string handling and thereby allow injecting a shell command is a vulnerability i find plausible.
> What I /do/ know is that a microphone implies an input and an input could be turned into a string. And an string passed to a shell can become a portal injecting commands.
Would have not broken my suspension of disbelief.
Cheers