Is there someone alive who still doesn't understand this? That their smartphone MUST be eavesdropping on them 100% of the time in order to hear the rare time they go "Hey Alexa" or "Hey Google"? How else could it possibly know when you said its name?
We use a Mic Lock so we never have to worry about govt listening in on us
They sell them on Amazon
KEEP CONVERSATIONS PRIVATE! Mic-Lock secures your device’s microphone input with a lifetime guarantee. When plugged in, Mic-Lock will automatically becomes the device’s primary “microphone” which prevents others from listening in.
PREVENT CYBER ATTACKERS: Our one-piece privacy solution prevents audio hackers from using your microphones or even your speakers to listen to you. Mic-Lock tricks your electronic device into believing its microphone is occupied by copying the exact signal a microphone generates, thus preventing cyber attackers from using it.
SIMPLE AND EASY TO USE: Remove rubber keychain top, plug into our 3.5mm headphone port, and you are good to go! Works with any device with a 3.5mm port, like laptops, desktop computers, cell phones, and tablets.
Don't come back and say they don't work; I've been using them for years and can attest they absolutely, 100%, unequivocally work exactly as described.
Is there someone alive who still doesn't understand this? That their smartphone MUST be eavesdropping on them 100% of the time in order to hear the rare time they go "Hey Alexa" or "Hey Google"? How else could it possibly know when you said its name?
We use a Mic Lock so we never have to worry about govt listening in on us
They sell them on Amazon
KEEP CONVERSATIONS PRIVATE! Mic-Lock secures your device’s microphone input with a lifetime guarantee. When plugged in, Mic-Lock will automatically becomes the device’s primary “microphone” which prevents others from listening in.
PREVENT CYBER ATTACKERS: Our one-piece privacy solution prevents audio hackers from using your microphones or even your speakers to listen to you. Mic-Lock tricks your electronic device into believing its microphone is occupied by copying the exact signal a microphone generates, thus preventing cyber attackers from using it.
SIMPLE AND EASY TO USE: Remove rubber keychain top, plug into our 3.5mm headphone port, and you are good to go! Works with any device with a 3.5mm port, like laptops, desktop computers, cell phones, and tablets.
Don't come back and say they don't work; I've been using them for years and can attest they absolutely, 100%, unequivocally work exactly as described.
It was clearly copied and pasted. Of course it reads like an ad.
Most phones don't even have a 3.5mm port these days...