Applidium engineers reverse engineered Siri’s communication protocol. Since Siri was introduced, hackers around the world have been looking for a way to break Apple’s security and port it to other devices. What does this mean? By reverse engineering Siri, one can have complete control of Siri, can be installed on any device Siri, you can be a mobile or tablet from another manufacturer.
Folks over Applidium were able to break security protocol of Siri and were able to find out what happens when we communicate with the assistant. They found that Siri sends and receives information from Apple servers to identify Apple iPhone 4S. Moreover, Applidium managed to run commands by Siri installed on a device other than iPhone 4S and get answers from Apple servers so the whole process runs smoothly.
Today, We managed to crack Siri’s protocol. As a result, We Are Able to use Siri’s recognition engine from Any Device. Yes, That Means Could anyone Android app now Write That year Siri uses the real! Or use Siri on an iPad! And we’re going to share this know-how with you.
The interesting part is that Applidium says any iPhone / iPhone / iPod Touch / Mac / Android terminal or other device can be used with Siri, the problem is that the worker must be ported to these devices. The Applidium already offers all the files with which Syria could use any device, but the process is complex and is not handy. Practically as soon as a jailbreak solution for iPhone 4S will be launched could see plenty of tweaks and applications that will use the assistance of Apple to improve the user experience of our terminals.