Anonymous 09/03/2017 (Sun) 05:07:51 No. 11008 del
I remember reading an article from some security conference about extracting data from infected computer through inaudible sound signals, perfect for some airgapped machines. This is basically the opposite, you can send commands with data streams, and since it runs proprietary voice recognition software, you may consider it a malware.