Siri is just the Trojan horse for Google to infiltrate the entire Apple ecosystem

Apple doesn’t have its own AI, so it has chosen a girlfriend. That girlfriend is none other than Google, which has just signed an agreement with Cupertino to make Gemini the center of future developments. Not one, no. Of many. We thought this was just about Siri. The initial official announcement was brief. Apple would use Gemini, but it seemed that it was going to do so basically to launch its long-awaited version of that personalized Siri governed by a generative AI model at once. It turns out that the agreement is broader. Gemini is Google’s Trojan horse to conquer Apple. Google’s statement revealed that this alliance went beyond what seemed to focus on Siri. In a post on XGoogle stated the following: “Apple and Google have signed a multi-year collaboration agreement that will see the next generation of Apple’s entry-level models based on Gemini models and Google’s cloud technology. These models will help power future Apple Intelligence features, including a more personalized Siri coming this year.” This makes it clear that although the initial protagonist will be Siri, the scope of the agreement can be much more important and affect the entire Apple hardware and software ecosystem. Considering that AI options from Apple Intelligence and Siri will likely reach many of its products and services, Gemini, which will power all of those models, would end up being an integral part of said ecosystem. Collaboration above all. As indicated in The Informationthe agreement allows Apple to ask Google to modify some aspects of how Gemini works, but above all it will allow Apple to adjust Gemini itself so that it responds to requests in the way that Apple prefers. No Gemini branding. Sources close to the negotiations add an interesting fact: it will not be noticed that the AI ​​that we use in Siri and other Apple products is actually based on Gemini. Google’s branding will be blurred, and users will not know what is underneath and what is the engine of those interactions with AI. A more emotional Siri. That source cited in The Information also reveals that Siri will be more approachable and emotional. “Historically Siri has always had difficulty with emotional support,” he explains, but in the Gemini-based version, “Siri will give more complete conversational responses, just like ChatGPT and Gemini.” That, of course, has two sides: AI becomes more “human”, but for vulnerable people that can end up being dangerous. Apple Intelligence will still be there. Although Gemini thus infiltrates the Apple ecosystem, both companies clarified that Apple Intelligence will continue to be available on Apple devices and on the servers of its Private Cloud Compute platform. What is not so clear is that the Apple Intelligence models do not also end up being based on Gemini. Especially since Apple’s “foundational models will be based on Google’s Gemini models.” A priori that should mean internal changes at Apple Intelligence as they adopt Google technology. The new Siri at WWDC? The new version of Siri is expected to be presented in March or April behind him controversial delay which was announced almost a year ago. The new voice assistant will theoretically debut in iOS 26.4, the update that should arrive in those months, but Apple could take the opportunity to announce it at WWDC 2026, two years after that initial announcement that ended up becoming a fiasco: Apple promised things which it has not achieved until now, but Gemini may finally become the solution to that problem. In Xataka | Apple has decided not to enter the AI ​​war because it believes it has something more important: the entry “door”

A North Korean spy tried to infiltrate a cryptocus. I didn’t expect you to ask him for Halloween

The cinema, the video games and the stories of double agents They have been showing the image of the spies as riskylonely and, sometimes, lustful. The reality is that this field work has gone to the background in an era in which cyberspage and labor infiltration prevails. China and North Korea are protagonists from time to time when we talk about this matter and, sometimes, the cover is so rough that a single question is enough to uncover the cake: What is done on Halloween. Steven Scott Jr. Smith. That name is the most American, the equivalent of José Pérez in Spain. Steven asked for work in Kraken, a bank and exchango of American cryptocurrencies and, from the first minute of the test, something failed. As we read in FortuneSteven, who claimed to have 11 years of experience as a software engineer in companies like Cisco and two years living in Houston, Texas, connected to the video call with a different name than the one he showed in his curriculum and changed it quickly. He also answered simple questions with hesitation and, for more complex ones, it took something more to answer, as if he were talking to someone else who smeared the answers. Cornering the spy. That alerted the recruiters, and that is where they began to ask questions that had nothing to do with work, since they hid another intention: catch what they thought it was a spy trying to sneak into their system. The interview was conducted on October 31, Halloween party in the United States, and recruiters asked three key questions. Given the comment that that night it would be necessary to close before because there would be children calling the doors of the houses, Steven commented that he would not do “special” if they called his. Among the interests that reflected in the curriculum was the food. One of the recruiters told him that he would go to Houston in a few days and that if he could recommend a city restaurant. Steven looked around, smiled and said “there is nothing special here.” Rare, considering that, in a city of 2.3 million inhabitants, at least one good restaurant must be. The third request was to show him an identification. Steven commented that he did not have it at hand, but after a few minutes, he shared a photo of his driving card with an address that is more than 480 kilometers from Houston. In the following video of CBS you can see both the license and the question of the restaurants: Culture of productive paranoia. Kraken herself tells the story in her blog, detailing that they realized that something was going wrong and continued with the interview with an objective: to study their focus to try to extract details about their identity. The companies that are dedicated to the crypto have had recent robberies and Nick Perceco problems, one of Kraken’s security responsible, states that these attacks are not an exclusive problem of companies such as their own, but a global threat. It also points three keys to this recent espionage/robbery strategy: Not all attackers force the entrance, but try to enter through the main door of the companies, applying as employees. The generative AI facilitates deception, since it is used to pass the initial tests such as the curriculum or the photo, so the interviews seem key with verification questions that avoid predictable patterns. Halloween’s example or restaurant recommendation, for example. Finally, it is key to have a productive paranoia culture. They affirm that security is not only the responsibility of the recruitment and security equipment of companies, but that it should be a more global mentality. It is not isolated. When Kraken’s team investigated Steve’s operational history, he discovered interesting things. For example, I used a Mac desktop located in a shared data center. It was connected using a VPN to hide both the location and the network activity and its curriculum was linked to a github profile in which a mail address compromised in a data filtration was included. This agrees with previous research and discoverieswith spies that use that same proceed when connected using VPN to simulate that they are in a direction in the United States, but really being in North Korea and China. And they are not only trying to sneak into American companies: Europe does not get rid. Missile industry. The suspicion of researchers? Double. On the one hand, there are spies that directly steal in their companies. An example are cases of crypto companies. But another case has to do with the sending of its full salary to the North Korean government to finance the arms industry. Famous is the case by Christina Marie Champman in Arizona. A farm of remote computers operated from which the attackers simulate that they are on American soil. As noted CNNusing that network, 6.8 million dollars were achieved for, according to Bloombergfinance the North Korean nuclear weapons program. China does not get rid, but it has another approach. And not only North Korea is interested in sneaking into Western companies: he has also caught China on occasion. The objective, however, is different: while some seek funds for their arms industry, others want knowledge for the development of the chips industry. At the end of 2003, ASML (the European company that creates the most advanced machines to create avant -garde semiconductors) denounced the theft of confidential information, suspecting that one of its former employees andNt added business secrets to Huawei. Another spy was also accused of stealing SK Hynix information, DE new, for Huawei. It is a major problem for the West, but also … for China. In mid -2024, the United States sent an alert message to ASML and the rest of the Netherlands universities: “Beware of Chinese students”And this is something that obviously puts a target on all students, also about the legitimate ones. Images | Xataka with chatgpt In Xataka | North Korea’s military tactics that prevents defections. … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.